Chapter 22: Network Security Flashcards
What is a NAS and how can you minimize security risks when using it?
A device used for storing and accessing data over a network. To minimize security risks, use complex passwords, remove default passwords, and apply all software updates.
What are the advantages and disadvantages of USB flash drives?
Advantages: Easy to transport, affordable, and convenient. Disadvantages: Can be easily lost, leading to potential data breaches meaning data can be stolen
How can encrypted USB flash drives enhance security?
Encrypted USB flash drives require a password or code to access data, making them unreadable without authorization.
What is a cyber attack?
Any kind of malicious attack on a network - connected device
What are the two main categories of cyber attacks?
Cyber attacks exploit either human behavior (social engineering) or technical weaknesses.
What is social engineering?
Social engineering is manipulating people into revealing confidential information or providing access to secure systems.
What are three common types of social engineering?
Phishing, shoulder surfing, and pharming.
What is phishing?
Phishing is an attempt to obtain sensitive information from a user by pretending to be a trustworthy source, often through email or fake websites.
How does phishing typically work?
A user receives an email asking them to update security details. Clicking a link leads to a fake website that looks legitimate, where they enter credentials that are stolen by attackers.
What is shoulder surfing?
Observing someone enter sensitive information, such as a PIN or password, to gain unauthorized access.
What is pharming?
Redirecting users from a legitimate website to a fake one in order to obtain personal information.
How can you prevent pharming?
Check website URLs, ensure HTTPS is used, verify security certificates, install updates, and use antivirus software.
What is unpatched software and why is it a security risk?
Software that hasn’t had the latest security updates applied to it, making it vulnerable to attack
Network Security
Activities designed to protect a network & its data from threaths such as viruses, hacker attacks, denial of service attacks, data interception & theft, & equipment failure
How can USB devices be a security threat?
USB devices can contain malware that infects systems or allows unauthorized data transfers.
USB definition
Socket found on most modern computer systems
Hacking
The act of gaining unauthorised access to a computer system & the data it contains
Throughput
Allow more data to pass through them
Malware
Any kind of software that is designed to disrupt the use of a computer system
What is an eavesdropping attack?
Eavesdropping is theft of data sent between devices without the user’s knowledge.
How can security be incorporated in software design?
By considering authentication, user access levels, encryption, threat protection, and secure coding practices.
What is penetration testing?
Penetration testing is a legal and authorized attempt to hack into a system to identify security vulnerabilities.
What are commercial analysis tools used for?
They scan systems for known vulnerabilities but must be kept updated to remain effective.
What is an audit trail?
A record of activities that have taken place on a computer system, including what has happened & who made the change
How do secure operating systems improve cybersecurity?
Secure OS designs minimize vulnerabilities and provide enhanced security features to prevent attacks.
What does effective network security involve?
It involves monitoring, software patching, policy enforcement, and user training to prevent attacks.
What is ethical hacking?
Ethical hacking is testing a system’s security by legally attempting to break into it to identify weaknesses.
What are network and user policies?
Policies that define who can access systems, password requirements, security maintenance, and compliance rules.
What are the three key aspects of network security?
Confidentiality, Correctness (Integrity), and Availability.
Why is confidentiality important in network security?
It prevents unauthorized access, interception, or theft of data by criminals.
How can data confidentiality be protected?
By restricting access to authorized users, preventing misuse, and encrypting data.
What is the significance of data correctness?
Ensures data remains accurate and unchanged unless authorized, preventing serious errors in records and systems.
Why is network availability crucial?
Ensures data and systems remain accessible and operational when needed.
What are some threats to network availability?
Virus attacks, Denial of Service (DoS) attacks, data deletion, data theft, and data modification.
What are the consequences of data loss in an organization?
Loss of customer trust, financial loss, operational failure, and possible bankruptcy.
What is authentication in network security?
The process of verifying a user’s identity using credentials like usernames, passwords, PINs, or biometrics.
What are three key methods for securing a network besides authentication?
Access control, firewalls, and physical security.
What is access control?
A method of restricting access to files and data based on user permissions.
What are the two main types of access control?
Read-only access and read-and-write access (modify access).
What is a firewall?
A network security system that monitors and controls data transfer between networks based on a set of security rules.
What are some functions of a firewall?
Blocking unauthorized access, preventing data theft, stopping hacking attempts, and restricting specific protocols or network addresses.
What are the two main types of firewalls?
Software-based firewalls (for individual computers) and hardware-based firewalls (for business networks).
What is physical security in network security?
Controlling access to critical parts of a network using physical methods rather than software
What are some physical security measures?
Using electronic locks, burglar alarms & security tags.
Why is cloud storage beneficial for network security?
Ensures data availability, provides off-site backup, allows scalable storage, and automates data backups.
What are some security risks of cloud storage?
Dependency on third-party providers, risk of data breaches & reliance on Internet access.
How can cloud storage security risks be mitigated?
Using encryption, storing data in multiple locations, and choosing providers with strong security policies.
What is Network-Attached Storage (NAS)?
A hardware device connected to a network that provides file storage accessible to network devices.
What are common security risks with NAS devices?
Use of default passwords, lack of software updates, and remote hacking vulnerabilities.
How can NAS security be improved?
Using complex passwords, changing default passwords & regularly updating software
Denial of service
Attack on a network that attempts to prevent legitimate users from accessing its services
Code vulnerability
Weaknesses in a computer program that attackers can exploit, potentially gaining access to the computer system or the data within it
Modular testing
Testing each block of code as it is completed to ensure the code works as expected