9. Security and Data management Flashcards

1
Q

Methods of identifying vulnerabilities (3)

A

🔎footprinting
🔎ethical hacking
🔎penetration testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Footprinting definition and purpose

A

Gathering all available information about the network/system
Enables a tester to see how much information a hacker could find and allows company to remove it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Ethical hacking definition

A

Hacking carried out with systems permission (to search for weak points)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Penetration testing definition

A

A subset of ethical hacking
Testing system to find vulnerabilities done by software or manually

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Penetration testing types

A

Targeted testing
External testing
Internal testing
Blind testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Targeted testing definition (done by who)

A

Done by IT and pen testing team together

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

External testing definition/purpose

A

See how far in an attacker can get

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Blind testing definition/purpose

A

Limit information available to tester to simulate a real hacker’s actions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Different forms of attack based on technical weakness (3)

A

DoS attack, password attack, IP address spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Different forms of attack based on user behaviour (2)

A

Social engineering, phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

DoS attack definition

A

Computer system becomes unavailable to intended users. Sometimes caused by bombarding System with emails/requests

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Brute force password attack definition

A

Hacking algorithm tries all combinations until one fits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Dictionary password attack definition

A

Systematically trying every word in dictionary until it finds a password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

IP address spoofing definition

A

A false IP address is put into a data packet to hide the senders real identity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Social engineering definition

A

Manipulation of someone to divulge confidential information e.g. password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Phishing definition

A

Attempting to gain confidential/personal information by pretending to be an official site

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Malicious software/malware definition

A

Any software that could be used to disrupt a computer’ operation/compromise a user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Virus definition

A

Computer programs that copy themselves onto other programs, often with malicious intent (e.g. damage data, fill the hard drive, shut down the computer unexpectedly)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Worm definition

A

Like viruses but replicate in order to spread to other computers in a network

20
Q

Key loggers definition

A

Capture user’s keystrokes and sends to a 3rd party

21
Q

Trojan definition

A

Appears to perform a useful function but provides a ‘backdoor’ for data to be stolen & sent to third party

22
Q

Methods of protection against dangers that arise from use of networks (other than firewalls, antivirus programs) (3)

A
  • Keeping software updated regularly
  • Using security tools (e.g. password strength checkers)
  • Training personnel to take sensible precautions (e.g. not inserting flash memory given by a stranger)
23
Q

Disaster recovery policy purpose

A

So everyone knows how to cope in the event of a disaster where all work is potentially lost (e.g. fire)

24
Q

Disaster recovery policy aims (4)

A
  • Minimise interruptions to normal operations
  • Limit extent of disruption and damage
  • Establish alternative means of working so staff know how to proceed
  • Provide for smooth and rapid restoration of service
25
Acceptable use policy purpose
To set out guidelines for how the system should be used
26
Acceptable use policy contents (4)
List of unacceptable uses such as: - visiting obscene websites - up/downloading obscene images - handling offensive material - sending unsolicited emails (spam)
27
Internet cookie definition
Little bit of data generated by website and stored on your browser Can remember your information and how you used the site
28
Why are internet cookies used
To provide customised web pages
29
Why could internet cookies be a security issue
Hold personal information
30
What are formal codes
Set of rules enforced by threat of disciplinary action
31
What is an informal code
Expectations, customs, habits
32
How does lossless compression work & results in...
Uses algorithms to replace common strings with tokens; can be decompressed later. Results in no loss of data quality
33
Compression advantages (2) and disadvantages (2)
AD: - Smaller file size - files take us less storage space - Faster upload, download and transfer times DISAD: - Precision can be lost - Not always possible to restore to original state (decompress)
34
Dangers that can arise from the use of networks (8)
- hacking - virus installation - malware - spyware - trojans - worms - technical breakdown - interception of data as it's transferred DEFINITIONS
35
Security tools to keep networks secure (and what they do) (5)
- Regularly updated anti-virus software - Firewalls - monitor data in and out, prevent hackers from accessing system - 2-factor authentication - adds item of specific personal info. (e.g. code texted to phone) - different access levels - passwords to restrict access
36
Why are backups and archiving files done?
As a precaution against permanent loss of data (by accident or hacking)
37
File backups definition
Making copy of data regularly and storing it off site or in a secure location on a detachable medium (e.g. flash disc)
38
Explain generations of files
Most recent copy of data = son file If son file's data is lost, father file can be used (and so on) Order of backing up: Grandfather becomes son, father become grandfather, son becomes father
39
Why should backups be made regularly
The older the file becomes the less likely it is to match current data
40
Compression ratio equation
Compression ratio = original file size/compressed file size
41
How does compression free up memory space
Makes file size smaller
42
Lossy compression results in...
Reduction in data quality
43
Dangers that can arise from using computers to store personal data (5)
- Hacking (data deliberately changed/stolen/deleted - unauthorised) - Computer virus - Hard drive crash - Interception of data during transfer (e.g. email) - data stolen from thrown away hard drives
44
Different access levels (3)
- No access - Read and Write access - Read only access
45
Suitable password requirements (4)
- Strong (mixture of upper and lower case, digits, special symbols) - changed regularly - never revealed - not containing personal info (DOB, pet name)
46
Encryption definition and example
Scrambling data to prevent it being understood if intercepted (a key de-crypts it) XOR
47
Archiving files - what and why
Storing data that's no longer in current/frequent use but is stored for legal, historical or security reasons