Chapter 22: Network Security Flashcards

1
Q

What is a NAS and how can you minimize security risks when using it?

A

A device used for storing and accessing data over a network. To minimize security risks, use complex passwords, remove default passwords, and apply all software updates.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the advantages and disadvantages of USB flash drives?

A

Advantages: Easy to transport, affordable, and convenient. Disadvantages: Can be easily lost, leading to potential data breaches meaning data can be stolen

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How can encrypted USB flash drives enhance security?

A

Encrypted USB flash drives require a password or code to access data, making them unreadable without authorization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a cyber attack?

A

Any kind of malicious attack on a network - connected device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the two main categories of cyber attacks?

A

Cyber attacks exploit either human behavior (social engineering) or technical weaknesses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is social engineering?

A

Social engineering is manipulating people into revealing confidential information or providing access to secure systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are three common types of social engineering?

A

Phishing, shoulder surfing, and pharming.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is phishing?

A

Phishing is an attempt to obtain sensitive information from a user by pretending to be a trustworthy source, often through email or fake websites.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How does phishing typically work?

A

A user receives an email asking them to update security details. Clicking a link leads to a fake website that looks legitimate, where they enter credentials that are stolen by attackers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is shoulder surfing?

A

Observing someone enter sensitive information, such as a PIN or password, to gain unauthorized access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is pharming?

A

Redirecting users from a legitimate website to a fake one in order to obtain personal information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How can you prevent pharming?

A

Check website URLs, ensure HTTPS is used, verify security certificates, install updates, and use antivirus software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is unpatched software and why is it a security risk?

A

Software that hasn’t had the latest security updates applied to it, making it vulnerable to attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Network Security

A

Activities designed to protect a network & its data from threaths such as viruses, hacker attacks, denial of service attacks, data interception & theft, & equipment failure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How can USB devices be a security threat?

A

USB devices can contain malware that infects systems or allows unauthorized data transfers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

USB definition

A

Socket found on most modern computer systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Hacking

A

The act of gaining unauthorised access to a computer system & the data it contains

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Throughput

A

Allow more data to pass through them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Malware

A

Any kind of software that is designed to disrupt the use of a computer system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is an eavesdropping attack?

A

Eavesdropping is theft of data sent between devices without the user’s knowledge.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

How can security be incorporated in software design?

A

By considering authentication, user access levels, encryption, threat protection, and secure coding practices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is penetration testing?

A

Penetration testing is a legal and authorized attempt to hack into a system to identify security vulnerabilities.

23
Q

What are commercial analysis tools used for?

A

They scan systems for known vulnerabilities but must be kept updated to remain effective.

24
Q

What is an audit trail?

A

A record of activities that have taken place on a computer system, including what has happened & who made the change

25
Q

How do secure operating systems improve cybersecurity?

A

Secure OS designs minimize vulnerabilities and provide enhanced security features to prevent attacks.

26
Q

What does effective network security involve?

A

It involves monitoring, software patching, policy enforcement, and user training to prevent attacks.

27
Q

What is ethical hacking?

A

Ethical hacking is testing a system’s security by legally attempting to break into it to identify weaknesses.

28
Q

What are network and user policies?

A

Policies that define who can access systems, password requirements, security maintenance, and compliance rules.

29
Q

What are the three key aspects of network security?

A

Confidentiality, Correctness (Integrity), and Availability.

30
Q

Why is confidentiality important in network security?

A

It prevents unauthorized access, interception, or theft of data by criminals.

31
Q

How can data confidentiality be protected?

A

By restricting access to authorized users, preventing misuse, and encrypting data.

32
Q

What is the significance of data correctness?

A

Ensures data remains accurate and unchanged unless authorized, preventing serious errors in records and systems.

33
Q

Why is network availability crucial?

A

Ensures data and systems remain accessible and operational when needed.

34
Q

What are some threats to network availability?

A

Virus attacks, Denial of Service (DoS) attacks, data deletion, data theft, and data modification.

35
Q

What are the consequences of data loss in an organization?

A

Loss of customer trust, financial loss, operational failure, and possible bankruptcy.

36
Q

What is authentication in network security?

A

The process of verifying a user’s identity using credentials like usernames, passwords, PINs, or biometrics.

37
Q

What are three key methods for securing a network besides authentication?

A

Access control, firewalls, and physical security.

38
Q

What is access control?

A

A method of restricting access to files and data based on user permissions.

39
Q

What are the two main types of access control?

A

Read-only access and read-and-write access (modify access).

40
Q

What is a firewall?

A

A network security system that monitors and controls data transfer between networks based on a set of security rules.

41
Q

What are some functions of a firewall?

A

Blocking unauthorized access, preventing data theft, stopping hacking attempts, and restricting specific protocols or network addresses.

42
Q

What are the two main types of firewalls?

A

Software-based firewalls (for individual computers) and hardware-based firewalls (for business networks).

43
Q

What is physical security in network security?

A

Controlling access to critical parts of a network using physical methods rather than software

44
Q

What are some physical security measures?

A

Using electronic locks, burglar alarms & security tags.

45
Q

Why is cloud storage beneficial for network security?

A

Ensures data availability, provides off-site backup, allows scalable storage, and automates data backups.

46
Q

What are some security risks of cloud storage?

A

Dependency on third-party providers, risk of data breaches & reliance on Internet access.

47
Q

How can cloud storage security risks be mitigated?

A

Using encryption, storing data in multiple locations, and choosing providers with strong security policies.

48
Q

What is Network-Attached Storage (NAS)?

A

A hardware device connected to a network that provides file storage accessible to network devices.

49
Q

What are common security risks with NAS devices?

A

Use of default passwords, lack of software updates, and remote hacking vulnerabilities.

50
Q

How can NAS security be improved?

A

Using complex passwords, changing default passwords & regularly updating software

51
Q

Denial of service

A

Attack on a network that attempts to prevent legitimate users from accessing its services

52
Q

Code vulnerability

A

Weaknesses in a computer program that attackers can exploit, potentially gaining access to the computer system or the data within it

53
Q

Modular testing

A

Testing each block of code as it is completed to ensure the code works as expected