4) Network Security Flashcards

1
Q

What is malware?

A

A software that can harm devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does malware do?

A
  • delete or modify files
  • scareware make them beleive theres viruses
  • locking files
  • Spy ware
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How do malware access your device?

A
  • viruses attactch to certain devices
  • worms (soread really quickly and exploit weaknessnes)
  • Trojans (malware disguised)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is people at the weakpoint?

A

Catfishing people for information saying there a big company

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is phishing?

A

Criminals send emails or texts pretending to be a big company. They then say to update all details and all their details are gone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A way you can spot phishing?

A

Poor grammar

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Whats a brute force attack?

A

Type of attack to gain information by cracking passwords through trial and error. Eg use an automated software to produce likely combinations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is penitrating testing?

A

An organisation uses employes to stimulate attacks on their network
Find the weak point of a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is anti maleware software?

A

Designed to find and stop maleware damaging a network and devices on it. Companies use firewalls to prevent it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Whats physical security?

A

Protects the physical parts of the network.
Eg locks and cameras

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are user access levels?

A

Control which parts of the network different groups can access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are passwords?

A

Help unathorised users access the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a virus?

A
  • It can replicate istelf and spread from system to system by attaching itself to infected files
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

When is a virus activated?

A

When opened by a human

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a worm?

A

Replicate itself and spread system from system to system by findjng weakness of a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Whats a worm?

A

Replictaes itself and spread from system to sysetm by finding weakness in system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Whats a trojan?

A

A harmful program that looks real so users are tricked to install it

18
Q

What is spyware?

A

Secretley records the activities of the user on a computer. Main aim is to record usernames,passwords and credit card information

19
Q

What is a keylogger?

A

Secretly records the key presses of a user on a computer. Data is stored and sent back. Main aim is to record usernames and credit card information

20
Q

What is Ransomware?

A
  • Locks files on a computer using encryption so they can no longer use them
  • Demand money for them to unlock (btc)
21
Q

What is SQL injection?

A
  • Programing langauge to manipulate data in databases
  • It can trick the website into giving unauthorised access.
  • Can view and edit the contents of the database
22
Q

How is SQL injection used?

A

Malicious SQL query is entered into a data input box on a website

23
Q

Whats a DOS attack?

A
  • A computer repeatedly sends requests to a server to overload a system. It will make the server offline
24
Q

What is a Brute force attack?

A
  • Every combination is tested from start to finish. Not quick but can break password eventually and sped up with multiple computer systems
25
What is social engineering?
- Trick others into revealing their personal data by posing a trusted source - eg. IT asking for password
26
What is Interception?
- Data packets are intercepted by a third party and copied to a different location. - Packet sniffers are used to intercept and analyse data packets
27
Whats the purpose of a penetration test?
To find any risks or weaknesses and fix them
28
What are the 4 main type of penetration tests?
- Internal tests (see how much damage is done within the company) - External tests (infiltrate a system from outside a company) - Blind tests (no inside information and see what a real hacker would do) - Targeted tests (are by an IT department to find the faults in a system)
29
What is anti-malware software?
Used to locate and delete malware, like viruses,
30
How does the anti-malware software do it?
- Scans each file on the computer and compares it against a database of a known malware.
31
What are other roles of an anti-malware software?
- Checking all emails that come in and go out - Checking files as they are downloaded - Scanning viruses on hard drive
32
Whats a firewall?
- Manages incoming and outgoing network traffic
33
What does a firewall do?
- Data packet is processed to check wether it should be given access by the network. - Unexpected data packets will be filtered out and not accepted
34
Other roles of a firewall?
- Blocking access to insecure websites - Blocking programes from accessing the internet - Blocking unauthorised downloads
35
Whats a secure password?
- Secure password to minimise risk of users accessing
36
Whats read only access?
- User can only view file and not change data
37
What is encryption?
- Process of scrambaling data into an unreadable format so attackers cannot understand if intercepted.
38
How is encryption used?
- Plaintext is converted to scrambled ciphertext using an encryption key.
39
What is physical security?
- A lock can be used to prevent access to a server room or locations that store confidential data.
40
What are forms of physical security?
- Biometric - keycards - CCTV - Alarms - Staff