Cyber Security Flashcards
What are the 4 methods we use to protect networks?
authentication
encryption
firewalls
MAC address filtering
What is authentication?
Specific logins
(usernames and passwords)
the network manager can also decide which logins need to see which files.
When would we use authentication?
a place with a shared network like a school or company.
What is encryption?
process of turning plain text into an unreadable form
doesn’t prevent hacking but makes the data impossible to read
When would we use encryption?
Whenever you need to make sensitive data unreadable to unauthorised access
What is a firewall?
Software or/and hardware which is configured to only let certain types of traffic through it
When would you use a firewall?
Operating systems come with them pre-installed. large organisations may use more complex firewalls for protection
What is a MAC address?
Every physical device has its own unique MAC address embedded into it.
How does MAC address filtering work?
Can create a whitelist of allowed MAC addresses and only those devices can access certain things.
(does not stop a hacker using one of these devices though)
When would you use MAC address filtering?
Use it on wireless networks
What is cyber security?
Any process, practice or technology designed to protect networks, computers, programs and data from attack/ damage/ unauthorised access
What 6 threats do you have to consider?
- social engineering techniques
- malicious code
- weak and default passwords
- misconfigured access rights
- removable media
- outdated software
What is malicious code?
Any code used with intent to cause harm to the computer/network/program/data
What is penetration testing?
attempting to gain access to resources without knowledge of usernames, passwords and other normal means of access
What is white box PT?
simulates a malicious insider-usually works for the company.