Computer And Networks Security Flashcards

1
Q

Firewall

A

Barrier between internal network and Internet or untrusted networks.

Prevents unauthorised access and protect from types of cyberthreats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Virus

A

Infects some executable software which causes that software to spread the virus.

Contain payload which performs other malicious actions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Worm

A

Self replicate and actively transmit itself over a network to infect other computers.

They do not need to attach themselves to an existing program.

They cause harm to networks by consuming bandwidth.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Spyware

A

Collects small amounts of data about users without their knowledge.

Can slow computers by reporting internet surfing habits, changing settings, installing additional software and redirecting web browsers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Adware

A

Automatically displays or download ads to computer.

Usually integrated with spyware and displays ads related from spying.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Phishing

A

Attempting to acquire sensitive information such as usernames, passwords, bank account info’s by masquerading as a trustworthy entity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Social engineering

A

Act of manipulating people into performing actions or divulging confidential information rather than by breaking in or using technical vulnerabilities.

Leads to data breaches, unauthorized access, and financial loss.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How to protect computer from attacks

A

Keep software up to date, use antivirus software.

Use strong passwords, unique one and never reuse them.

Install and maintain firewalls helps block unauthorized access to network.

Use encryption to make data unreadable to unauthorized parties.

Implement access controls to ensure only authorized users access your network.

Regularly back up data to recover it in case of cyberattacks or disaster.

Use 2 step verification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

3 functions of antivirus software

A

Scan and Detection

Removal and Quarantine

Real time Protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Describe how malware can affect a system’s reliability and performance.

A

System crash

Sluggish performance

Reduced storage capacity

Network congestion

System instability

Data loss

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

BIOMETRIC SYSTEMS

A

verify or recognize identity of a person based on their unique physical or behavioral characteristics, such as fingerprints, facial recognition, iris/retina scans, voice recognition, or DNA analysis.
Used for security purposes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Describe THREE characteristics of biometric security systems

A

Uniqueness: rely on unique biological or behavioral characteristics specific to each individual.

Accuracy: measured in terms of False Acceptance Rate (FAR) and False Rejection Rate (FRR).

Security: more secure than passwords or PINs, because biometric traits cannot be easily replicated or stolen.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Advantages of biometric systems

A

High security, harder to gain access.

Convenient and fast way for users to authenticate their identity without remembering passwords or carry identification cards.

More accurate and easy to use.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Disadvantages of biometric systems

A

Cost: expensive to implement and maintain hardware, software, and infrastructure required for biometric systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Cybersecurity

A

Monitor and protect against online attacks.
Ex: hacking, snooping, phishing, online spying.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Hacking

A

Someone who seeks to breach defenses and exploit weaknesses in computer system or network.

17
Q

Ransomware

A

Denies you access to your files or computer until you pay a ransom.

18
Q

Spam

A

Untrusted bulk email,electronic equivalent of junk email that comes to your inbox.

Spam uses bandwidth and fills up databases.

19
Q

3 threats against computer network from external attackers

A

Malware attacks

Distributed denial of services attacks.

Social engineering attacks

20
Q

Trojan Horse

A

Pretends to be legitimate software.
Actually, carry out hidden harmful functions.

21
Q

Access Control List

A

Used in operating systems, network, other security systems

Ensure only authorized users or systems can access sensitive resources, such as files or network

22
Q

What is malware ?

A

Malware refers to any software intentionally designed to cause damage to a computer, server, network, or device.

This includes viruses, worms, ransomware, spyware, adware, and other harmful programs created by cybercriminals to steal data, disrupt operations, or gain unauthorized access.

23
Q

Denial of Service (DOS)

A

A type of cyberattack designed to disable, shut down, or disrupt network, website, or service.

Floods a server with traffic, making a website or resource unavailable.

Causes service disruption and potential financial loss.

24
Q

Pop up blocker

A

Prevents wen browsers for displaying pop-up windows or ads that automatically appear on user’s screen.

Block code that triggers popup windows or filter URLs or web scripts.

Pop-up can be annoying, disruptive, and dangerous .

Modern web browsers have in built pop-up blocker.

25
Q

Anti Spyware

A
26
Q

Man-in-the-Middle (MITM)

A

Intercepting communication between two parties to steal or alter data.

Compromises data integrity and confidentiality.

EX: Eavesdropping on an unencrypted email exchange.

27
Q

Sniffing

A

Intercepting and analyzing network traffic to capture sensitive information.

Leads to data theft and privacy violations.

Example:
Using Wireshark to capture login credentials on a Wi-Fi network.

28
Q

Scanning

A

Probing a network to discover active hosts, open ports, and services.

Helps attackers identify vulnerabilities for future exploitation.

Example:
Using Nmap to find open ports on a server.