Features of A Strong Password Flashcards
Features of a strong password
- At least 8 characters
- Mix of lower case, upper case, numbers and symbols
- No guessable information such as names
Purpose of a firewall
- A piece of software (or hardware) that monitors incoming and
outgoing signals - Can prevent unwanted incoming/outgoing signals
- Can block transmissions from unwanted/unknown IP address
- Can prevent hacking
Description of user access levels
Giving people different permission, e.g. some people cannot read files, some people can read and not change files and some people have full access
Description of encryption
- Jumbling up data … read without knowing the key to decrypt it, the data will not make sense
- Prevents people understanding data if they intercept it
Description and purpose of network forensics
- Monitoring what is happening on a network,
e. g what is being requested and transmitted - Analysing the data to find problems, illegal
activities etc.
Examples of network policy
- Strong passwords
- Unable to download files from the Internet
- Unable to access external media, e.g USB pen drive
- Unable to Install software
Definition of an SQL injection
- Entering SQL statements into a text book on a website
- When the form is submitted the query is executed by the database and
returns data meeting the query
Threats of a network
- Virus/malware
- Spyware
- Hacker
- People e.g shoulder surfing
- Brute force attack
- Data interception
- Poor network policy
- SQL injection
Definition of a Virus
- A piece of software
- that can replace itself
*- that can cause damage to a computer system or
the data
How are people the ‘weak point’ in a system?
- People’s carelessness can cause problems,
e.g leaving a computer logged on, using
weak passwords - People can perform malicious acts e.g shoulder
surfing
Definitions and examples of malware
- Software designed to cause damage to a
computer system/data - e.g virus (Trojan, worm spyware)
Importance of keeping data secure
- Data is valuable and private; data needs
protecting from being stolen and used for
malicious needs
Definition of a denial of service attack
- Sofware is designed to make lots and lots of
requests to a web server - The web server cannot take that many requests
and the website goes down
Purpose of network policies
- Rules of governing the use of the network
- Poor policy = rules for using the network that do
not keep he data secure
Description of penetration testing
Trying to gain unauthorised access into a system by all means in the order, to identify the weak points, so they can be fixed