Chap 22- Network security Flashcards

1
Q

What activities does network security covers? Explain.

A

•Confidentiality: Keeping data private.
•Correctness(Integrity)
•Avalability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Ways to protect data confidentiality

A

•Ensuring only authorized users can access parts of Network resources
•Stopping misuse: Authorized people accessing file they aren’t supposed to be.
•Encrypting data: Can’t read w/o the encryption key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What if the data is lacked of correctness (Integrity)?

A

-An error in patient’s health record or in manufacturing control system could cause serious consequences

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Ways that will disable the availability of the network

A

•Broken network hardware components
•Corrupted program code
•Virus/DOS that
×Slow down the network performance/stop it working
×Delete data
×Alter data or program code
×Allow data to be stolen or eavesdropped on

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What’s DOS & DDOS?

A

-Denial of service, Distributed Denial of Service
-Attack on a network preventing legitimate users from accessing to its service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Reasons why security is important.

A

Required to run organization
-If data lost/fail to fulfil order(DOS) >Lose trust>Bankrupt
-School’s cant run effectively if they can’t access to their data(Timetables,presentation,..)

Private/Confidential
-If data leak(not secure)>sue>lose trust>Close down

Financially Valuable
-If business plan to raise revenue is obtained by competitor>Undercut the business/Lose chance to raise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What’s two-factors authentication?

A

Security check where users have to type secure token from device or SMS from mobile

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are ways to secure data?(as organization)

A

•Acess control: Controls what permission a user has to particular file
•Firewall: Monitor and contol data that is sent moving from one network to another.
•Physical security: Only authorized people (network technicians & Sysadmin) can physically access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Why should organisation buy hardware based firewall than using software based?

A

•More flexiblilty in terms of rules
•Allow faster throughput of data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does firewall do?

A

•Inspects incoming, outgoing data
•Use firewall policy to decide whether to allow data to move from one network to another
•Rules designed to protect from wide range of potential threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Why is electronic lock system better than traditional?

A

•Record Entry/Exit times
•Deactivate individual card if employee lose it or leave company

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Ways to secure data physically?

A

•Install burglar alarm
•Security tagging
•Physical locking down equipment (safe)
•Physical guards
•Surveillance Technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Why is physical security so important?

A

•Anyone with physical access can easily bypass access control or authentication system.
•Could copy, modify, delete any data on network.
•Install malware to gain remote access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What can firewall policy do?

A

•Stop certain protocols from being used.(FTP->prevent copying organization data to external sever)

•Block data coming/going to certain Network Address(URL/IP)
[ Eg.Website,server,
computer,another country and organization]

•Stop attempts at hacking by disallowing data matches pattern attacker would use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What can organization do in firewall to meet certain circumstances?

A

They can customize the firewall policy to meet their circumstances.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What’s NAS? Typical home/organization use consists?

A

•Network attached storage connected to a network.
•Provide file storage for devices in network.

Home:Single Hard Drive,Associated network hardware
Organization: Several Hard drive

17
Q

Additional features of NAS?

A

•Accessible via internet
•Specialist app for smartphones to access files stored on NAS

18
Q

Mistakes users make with NAS?

A

•Not changing device’s default password (Use complex)
•Not updating software running on NAS(fix security weaknesses)

19
Q

Pros & Cons of USB flash drive?

A

Pros
•Easy to transport
•Cheap for amount of storage available
•Very convenient to use

Cons
•Easily lost large amount of sensitive information on drive

*Use encrypted Flash drive

20
Q

USB?

A

Universal Serial Bus

21
Q

Intentions of cyber attack?

A

•Make system unavailable
•Delete or modify information
•Gain access to data in system
•Physical damage a device(By overriding safety limits)

22
Q

Social engineering?

A

Attacks rely on exploiting human’s behavior to reveal sensitive information

23
Q

Forms of social engineering?

A

•Phishing: Attempt to get sensitive information through sms,VC, email, fake web(domain spoofing)
•Pharming: Spread malware that changes IP of domain name to fake web. [Malware can infect DNS->Everyone is redirected to bogus sites]
•Shoulder Surfing:Directly observing a user by looking over shoulder, using hidden cam to gain confidential information.(username,PIN)

24
Q

How to prevent Pharming?

A

•Chrck the http address of intended website
•HTTPS? when enter sensitive information
•Install latest security updates
•Install latest antivirus software

25
Q

Why is it longer to access website you have never visited before?

A

IP of visited website is stored in DNS cache so doesn’t need to request DNS server each time.

26
Q

Forms of technical weaknesses

A

•Unpatched software:
-Unpatched>Known weakness>exploit it and attack unpatched software.
-Patched>fix security issues(Manually installed by technicians)

•USB devices:
-ontain malware>transfer to cur system and copy data to attacked via internet.

•Eavesdropping:
-Intercepting transferred data from/to computer system.

27
Q

Why is “technical weaknesses”?

A

Unpatched software & USB devices> Allow malware>Eavesdrop

28
Q

What things should software designer should consider?

A

•What authentication?
•Diff level access for diff user
•Warning issued before risky operation (copy, deleting)
•Stored data encrypted?
•Threats software will face, will software run on computer connected to internet?

29
Q

What’s modular testing and why is it used?

A

-Testing each block of code separately to ensure code works as intended.
-To prevent hackers from exploiting small problem in code to access to data or system

30
Q

Ways to protect cyber attacks?(organization)

A

•Audit Trails
•Secure OS
•Provide effective network security

31
Q

Why are IPA standards needed?

A

So that all devices from diff manufacturers will use the same type of address and can communicate each other

32
Q

Benefits of Audit Trials?

A

•There’s record of who changed what when
•Identifies when error/security issue is introduced
•Enables program to be rolled back previous state
•Improve accountability/produce robust code