5.2: network security Flashcards

1
Q

Two-factor authentitication

A

A typical two-factor authentication process will first ask you to enter a password. If this is correct,
the system will send a code by text message to your mobile phone.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

biometric authentitication

A

A biometric is a physical characteristic such as a fingerprint or facial image

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

access rights and access levels

A
  • When a user is given access to a computer system, their access to specific files within the system can be restricted
  • possible to restrict the level of access that a user has for example view or edit a file
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

MAC adress filtering

A

a unique number that is assigned to a network interface card when the card is manufactured

filter can be set up in 2 ways:
* safelist
* blocklist

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

safelist

A

used to specify the MAC addresses of devices that are allowed to connect to the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

blocklist

A

can be used to specify the MAC addresses of devices that are not allowed to connect to the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

firewalls

A
  • sits between two networks, usually a trusted network (such as your home network) and an untrusted network (such as the internet)
  • The firewall will attempt to prevent malicious traffic entering the network.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

physical security

A
  • CCTV
  • guards
  • locked rooms
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

advantages of cloud and contemporary storage

A
  • The cloud storage provider is responsible for the hardware your data is stored on.
  • The amount of storage can easily be changed
  • protected from loss due to fire, theft of computers/servers, electrical failure, and so on.
  • Many cloud storage systems back-up your data
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

disadvantages of cloud and contemporary storage

A
  • You are relying on a third-party storage provider to keep your organisation running
  • Data stored carries the risk of other people gaining access to it
  • Users have to assume that the people providing the service are trustworthy
  • Access to cloud storage is dependent on high-speed Internet connection
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Social engineering

A
  • is the term used for a range of techniques employed by cybercriminals to deceive users into giving away their personal information
  • it involves humans trying to trick or manipulate other humans
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

forms of cyberattacks

A
  • phishing
  • shouldering
  • blagging
  • pharming
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

phinishing

A

an attack in which the victim receives a message
disguised to look like it has come from a reputable source (for example, a bank). The message will
include a link that, when clicked, will either trick the user into revealing personal data or initiate
the installation of malware on the victim’s device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

pharming

A
  • a user being sent to a fake website that the user believes is the real one.
  • the user might be tricked into submitting personal information such as entering their username and password into a fake login window with URL that is very similar to a real one
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

shoulder surfing (shouldering)

A
  • It involves the attacker watching the victim, for example, over their shoulder, while they provide
    personal information.

It is often used to find out:
* Someone’s PIN at a cash machine
* The code to access a secure room
* Someone’s password whilst they type it on the keyboard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

unpatched software

A
  • The maker of the software will normally provide updates (referred to as patches) to fix security
  • The patches to fix the security issues often have to be manually installed by a technician.
  • Sometimes these patches get forgotten about so, the software remains vulnerable
17
Q

USB devices

A

any USB device can potentially be a security threat because it might contain malware that could be transferred to your system or copy data to the attacker via the Internet

18
Q

eavesdropping

A
  • eavesdropping means intercepting data being sent to/from another computer system.
  • eavesdropping on a network is simply reading data without actually copying or stealing it.
  • Security weaknesses such as unpatched software or a USB device might allow malware to be installed on the network that allows an eavesdropping attack
19
Q

penetration testing

A
  • testing to make sure that the system is secure from hackers or other malicious attacks. It is used to discover weaknesses in a system that could be exploited

2 main types:
* black-box penetration
* white-box penetration

20
Q

black-box penetration testing

A
  • designed to mimic an external attack on the system.
  • The tester will use brute force methods and try to exploit well-known software vulnerabilities to get access to the system
21
Q

white-box penetration testing

A
  • designed to mimic an attack from an insider who already has access to the system, and maybe has information about the way the system is configured and operates.
  • This can help safeguard against the actions of someone who is inside the organisation and up to no good
22
Q

ethical hacker

A
  • someone who hacks a system but does not intend to cause any harm.
  • usually people who are interested in finding out how secure systems are and see it as a challenge to identify any weaknesses in security.
  • illegal
23
Q

network forensics

A
  • process of monitoring and analysing network traffic.
  • done to identify suspicious activity or to provide evidence to help with criminal prosecutions.

there are 2 approaches:
* One approach is to capture the data as it passes an inspection point and write it to disk so it can be analysed later. However, this method can generate huge amounts of data
* The data could be filtered so that only certain data is captured, but this will impact the performance of the network as each Packet would need to be inspected before being allowed to proceed

24
Q

network audit software

A
  • allows a central record to be maintained, which records who logged on, when, and from which device or location and what files were accessed
25
Q

methods to reduce the chance of cyber attacks succeeding

A
  • audit trail
  • secure operating system
  • effective network security
26
Q

audit trail

A
  • a record of activities that have taken place on a
    computer system
  • automatically generated and likely to be in chronological order.
  • Ordinary users of a system shouldn’t be able to read it
  • usually contains date and time of change, what change happened, who or what made the change.
  • allow technicians to figure out what happened during a cyber attack; if the attack was successful
27
Q

secure operating systems

A

operating systems designed with security in mind

28
Q

effective network security

A

Well-educated technical staff, with up to-date training, are needed to keep software patched correctly, implement policies that reduce the chance of an attack being successful, train users in best practice in terms of security and monitor the systems to ensure there is no unauthorised access