4.2 Preventing vulnerabilities Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

List different ways to prevent vulnerabilities against attacks

A
  • Penetration testing
  • Anti malware software
  • Firewall
  • Use access levels
  • Password
  • Encryption
  • Physical security
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Penetration testing

A

Penn testing is the practice of deliberately trying to find the security role in your own systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Goal of penetration testing

A

Identify the targets of possible attacks
Identify possible entry points
Attempts to break in
Report back findings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Anti malware software

A

They detect malware and it gets sent to the anti virus company and verify whether it’s malware or not and then create signature of the virus
Then it is added to the database and tell computers to update

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a result of virus morph

A

It makes it harder to create a signature

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

External penetration test

A

The objective is to find out whether a hacker can get in, and once they’re in, find out how far they can get into the system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

External penetration test targets?

A

Email servers, web servers or firewalls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Internal Penetration test

A

The objective is as an employee with standard rights find how much damage a dishonest employee could do

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Define encryption

A

A way of securing daya so that it cannot be read without the encryption key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Prcoess of encryption

A

Passwords are stored with an ecryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Why is it important to have data encrypted?

A

If hacker obtains passwords and other data, it will be encrypted so it won’t be easily read

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How can you transmitt encrypted data?

A

HTTPS (Secure HyperText Transfer Protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How does HTTPS work?

A

Web browser sends its key and form sata, encrypting with the server’s key
The server encrypts the web page you request using your web browser’s key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Encryption on individual files

A

They can only be viewed by people who have the password. This can be done with software such as zip files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Encryption of drives

A

Passwords are used to access the encrypted files. Some removable media can be encrypted with special hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Firewalls

A

Separate a trusted network from an untrusted network (normally the Internet)

17
Q

How do firewalls work?

A

When data packets are sent around a small network, they are checked to see whether they are coming from and going to.

18
Q

What is a packet filterer?

A

A filterer that compares the packets to the filtering rules and if not, they are dropped

19
Q

How can you run firewalls?

A

They can be run on dedicated hardware (can be built into your device) or as software. For example your router

20
Q

Firewall features

A
  • Prevents attackers from gaining access to computers on a network
  • Can block certain malicious computers by filtering packets from a certain IP address.
  • Can prevent access to certain ports on the network. This can be known as port blocking
  • Malicious or inappropriate websites can be blocked
  • Dedicated hardware firewalls can be blocked
  • Software firewalls will slow down a computer
21
Q

User Access Levels

A

Access levels can be set on disks, folders and individual files

22
Q

Password policy

A

Passwords are often checked to see if they are secure enough. For example it might require a capital letter, special characters or numbers

23
Q

Physical security

A

Physical security is where hardware, software and networks are protected by physical methods.

24
Q

Give examples of physical security

A
  • CCTV
  • Intruder alarms
  • Door locks
  • Fences, barbed wire
  • Security guards
  • ID cards and signs
  • Turnstiles and gates