Data Security Flashcards

1
Q

Antivirus Software

A

A program that can be loaded into memory when the computer is running. It monitors the activity on a computer for the signs of a virus.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Firewalls

A

Software or hardware that controls the incoming and outgoing network traffic. Data is analysed to decide if it should be allowed through or not

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Access Levels

A

A method used to allow only certain users read and/or write access to data on a computer system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Passwords

A

Used to prove a persons identity to computer system, thus allowing them access to relevant data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Double authentication

A

Users provide 2 forms of ID. Usually something they know (pin) and something the have (bank card).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Network Forensics

A

This involves monitoring the traffic on a network. At regular intervals transmitted data packets are copied. The copy information about the packet are then stored for later analysis. This is usually processes in batches. The information gathered can help identify invasive traffic or to determine where data is being sent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Ethical hacking

A

Carried out with the permission of the system owner to cover all computer attack techniques.
An ethical hacker attempts to bypass system security and search for any weak points that could be exploited by malicious hackers. This information is then used by the system owner to improve system security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Penetration testing

A

A sub-set of ethical hacking that deals with the process of testing a network/system to find vulnerabilities that an attacker could exploit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Targeted

A

Carried out by the organisation’s IT team and the penetration testing team working together.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

External

A

to find out if an outside attacker can get in and how far they can get in once they have gained access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Internal

A

to estimate how much damage a dissatisfied employee could cause

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Blind

A

to simulate the actions of a real attacker by severely limiting the information given to the team performing the test.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Foot printing

A

The first step in the evaluation of system security. It involves gathering all available information about the computer system or network. Used to limit technical information about a system that is publicly available.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Networking standards

A

Ensures how different hardware and software produced can work together. Without networking standards, it would be difficult to develop networks that easily share information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Viruses

A

A program that is able to copy itself onto other programs with the intention of damaging data. A virus is transmitted by ‘piggybacking’ on another program known as a ‘vector’.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Key logger

A

Covert programs that capture keyboard inputs and transmits or stores this data for a hacker.

17
Q

Worm

A

a standalone program that self-replicates in order to spread to other computers. It does not need a vector.

18
Q

Spyware

A

Installed by opening attachments or downloading infected software. Can be used to collect stored data without the user’s knowledge.

19
Q

Trojan Horse

A

Appears to perform a useful function, but provides a ‘backdoor’ that enables data to be stolen.

20
Q

SQL injection

A

Malicious users can inject SQL commands into a web page input form and compromise data held in a database

21
Q

DoS Attack

A

Denial of service attacks attempt to make your website and servers unavailable to real users, by swamping a system with fake requests.

22
Q

Brute Force Attack

A

A hacking algorithm, which tries all possible combinations of lowercase and uppercase characters, numbers and symbols to gain unauthorised access to a computer system.

23
Q

IP address spoofing

A

Changing the IP address of a real host so that a visitor who types in the URL of a real site is taken to a spoofed web page in order to steal personal details.

24
Q

Social Engineering

A

Involves tricking a user into giving out sensitive information such as a password e.g. phishing (an attempt to get users’ details using fake emails).