Features of A Strong Password Flashcards
Features of a strong password
- At least 8 characters
- Mix of lower case, upper case, numbers and symbols
- No guessable information such as names
Purpose of a firewall
- A piece of software (or hardware) that monitors incoming and
outgoing signals - Can prevent unwanted incoming/outgoing signals
- Can block transmissions from unwanted/unknown IP address
- Can prevent hacking
Description of user access levels
Giving people different permission, e.g. some people cannot read files, some people can read and not change files and some people have full access
Description of encryption
- Jumbling up data … read without knowing the key to decrypt it, the data will not make sense
- Prevents people understanding data if they intercept it
Description and purpose of network forensics
- Monitoring what is happening on a network,
e. g what is being requested and transmitted - Analysing the data to find problems, illegal
activities etc.
Examples of network policy
- Strong passwords
- Unable to download files from the Internet
- Unable to access external media, e.g USB pen drive
- Unable to Install software
Definition of an SQL injection
- Entering SQL statements into a text book on a website
- When the form is submitted the query is executed by the database and
returns data meeting the query
Threats of a network
- Virus/malware
- Spyware
- Hacker
- People e.g shoulder surfing
- Brute force attack
- Data interception
- Poor network policy
- SQL injection
Definition of a Virus
- A piece of software
- that can replace itself
*- that can cause damage to a computer system or
the data
How are people the ‘weak point’ in a system?
- People’s carelessness can cause problems,
e.g leaving a computer logged on, using
weak passwords - People can perform malicious acts e.g shoulder
surfing
Definitions and examples of malware
- Software designed to cause damage to a
computer system/data - e.g virus (Trojan, worm spyware)
Importance of keeping data secure
- Data is valuable and private; data needs
protecting from being stolen and used for
malicious needs
Definition of a denial of service attack
- Sofware is designed to make lots and lots of
requests to a web server - The web server cannot take that many requests
and the website goes down
Purpose of network policies
- Rules of governing the use of the network
- Poor policy = rules for using the network that do
not keep he data secure
Description of penetration testing
Trying to gain unauthorised access into a system by all means in the order, to identify the weak points, so they can be fixed
Purpose of anti-malware software
When run, it scans a computer to find malware and either removes it or quarantines it
Definition of data interception
- A piece of software
- …downloaded without knowledge
- …that records keyboard presses
- …that sends the data o a third party to
analyse
Definition of a brute force attack
Someone (or a computer) methodically tries to gain access to a computer system, e.g. by trying all password combinations
Definition of spyware
Data is being transmitted somewhere, and someone (other than the intended recipient) accesses the transmission and reads t he data
Purpose of network policies
- Rules for governing the use of the network
* Poor policy=rules for using the network that do not keep the data secure
Description of penetration testing
Trying to gain unauthorised access into a system by all means in order to identify the weak points so they can be fixed
Purpose of anti-malware software
When run, it scans a computer to find malware and either removes it or quarantines it
Definition of data interception
- A piece of software
- …downloaded without knowledge
- …that records keyboard presses
- …and sends the data to a third party to analyse
Definition of a brute force attack
Someone(or a computer) methodically tries to gain access to a computer system, e.g. by trying all password combinations
Definition of spyware
Data is being transmitted somewhere, and someone other than the intended recipient accesses the transmission and reads the data
Purpose of antivirus software
- when run, it scans a computer to find viruses and either removes them or quarantines them
- Scans download files for viruses; warning the user of any present
Definition of a hacker
A person who attempts to gain unauthorised access to a computer system
Purpose of anti-virus spyware software
- When run, it scans a computer to find spyware and either removes it or quarantines them
- Scans downloaded files for spyware; warning the user of any present