5.2: network security Flashcards
Two-factor authentitication
A typical two-factor authentication process will first ask you to enter a password. If this is correct,
the system will send a code by text message to your mobile phone.
biometric authentitication
A biometric is a physical characteristic such as a fingerprint or facial image
access rights and access levels
- When a user is given access to a computer system, their access to specific files within the system can be restricted
- possible to restrict the level of access that a user has for example view or edit a file
MAC adress filtering
a unique number that is assigned to a network interface card when the card is manufactured
filter can be set up in 2 ways:
* safelist
* blocklist
safelist
used to specify the MAC addresses of devices that are allowed to connect to the network
blocklist
can be used to specify the MAC addresses of devices that are not allowed to connect to the network
firewalls
- sits between two networks, usually a trusted network (such as your home network) and an untrusted network (such as the internet)
- The firewall will attempt to prevent malicious traffic entering the network.
physical security
- CCTV
- guards
- locked rooms
advantages of cloud and contemporary storage
- The cloud storage provider is responsible for the hardware your data is stored on.
- The amount of storage can easily be changed
- protected from loss due to fire, theft of computers/servers, electrical failure, and so on.
- Many cloud storage systems back-up your data
disadvantages of cloud and contemporary storage
- You are relying on a third-party storage provider to keep your organisation running
- Data stored carries the risk of other people gaining access to it
- Users have to assume that the people providing the service are trustworthy
- Access to cloud storage is dependent on high-speed Internet connection
Social engineering
- is the term used for a range of techniques employed by cybercriminals to deceive users into giving away their personal information
- it involves humans trying to trick or manipulate other humans
forms of cyberattacks
- phishing
- shouldering
- blagging
- pharming
phinishing
an attack in which the victim receives a message
disguised to look like it has come from a reputable source (for example, a bank). The message will
include a link that, when clicked, will either trick the user into revealing personal data or initiate
the installation of malware on the victim’s device
pharming
- a user being sent to a fake website that the user believes is the real one.
- the user might be tricked into submitting personal information such as entering their username and password into a fake login window with URL that is very similar to a real one
shoulder surfing (shouldering)
- It involves the attacker watching the victim, for example, over their shoulder, while they provide
personal information.
It is often used to find out:
* Someone’s PIN at a cash machine
* The code to access a secure room
* Someone’s password whilst they type it on the keyboard