Features of A Strong Password Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

Features of a strong password

A
  • At least 8 characters
  • Mix of lower case, upper case, numbers and symbols
  • No guessable information such as names
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Purpose of a firewall

A
  • A piece of software (or hardware) that monitors incoming and
    outgoing signals
  • Can prevent unwanted incoming/outgoing signals
  • Can block transmissions from unwanted/unknown IP address
  • Can prevent hacking
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Description of user access levels

A

Giving people different permission, e.g. some people cannot read files, some people can read and not change files and some people have full access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Description of encryption

A
  • Jumbling up data … read without knowing the key to decrypt it, the data will not make sense
  • Prevents people understanding data if they intercept it
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Description and purpose of network forensics

A
  • Monitoring what is happening on a network,
    e. g what is being requested and transmitted
  • Analysing the data to find problems, illegal
    activities etc.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Examples of network policy

A
  • Strong passwords
  • Unable to download files from the Internet
  • Unable to access external media, e.g USB pen drive
  • Unable to Install software
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Definition of an SQL injection

A
  • Entering SQL statements into a text book on a website
  • When the form is submitted the query is executed by the database and
    returns data meeting the query
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Threats of a network

A
  • Virus/malware
  • Spyware
  • Hacker
  • People e.g shoulder surfing
  • Brute force attack
  • Data interception
  • Poor network policy
  • SQL injection
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Definition of a Virus

A
  • A piece of software
    • that can replace itself

*- that can cause damage to a computer system or
the data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How are people the ‘weak point’ in a system?

A
  • People’s carelessness can cause problems,
    e.g leaving a computer logged on, using
    weak passwords
  • People can perform malicious acts e.g shoulder
    surfing
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Definitions and examples of malware

A
  • Software designed to cause damage to a
    computer system/data
  • e.g virus (Trojan, worm spyware)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Importance of keeping data secure

A
  • Data is valuable and private; data needs
    protecting from being stolen and used for
    malicious needs
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Definition of a denial of service attack

A
  • Sofware is designed to make lots and lots of
    requests to a web server
  • The web server cannot take that many requests
    and the website goes down
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Purpose of network policies

A
  • Rules of governing the use of the network
  • Poor policy = rules for using the network that do
    not keep he data secure
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Description of penetration testing

A

Trying to gain unauthorised access into a system by all means in the order, to identify the weak points, so they can be fixed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Purpose of anti-malware software

A

When run, it scans a computer to find malware and either removes it or quarantines it

17
Q

Definition of data interception

A
  • A piece of software
  • …downloaded without knowledge
  • …that records keyboard presses
  • …that sends the data o a third party to
    analyse
18
Q

Definition of a brute force attack

A

Someone (or a computer) methodically tries to gain access to a computer system, e.g. by trying all password combinations

19
Q

Definition of spyware

A

Data is being transmitted somewhere, and someone (other than the intended recipient) accesses the transmission and reads t he data

20
Q

Purpose of network policies

A
  • Rules for governing the use of the network

* Poor policy=rules for using the network that do not keep the data secure

21
Q

Description of penetration testing

A

Trying to gain unauthorised access into a system by all means in order to identify the weak points so they can be fixed

22
Q

Purpose of anti-malware software

A

When run, it scans a computer to find malware and either removes it or quarantines it

23
Q

Definition of data interception

A
  • A piece of software
  • …downloaded without knowledge
  • …that records keyboard presses
  • …and sends the data to a third party to analyse
24
Q

Definition of a brute force attack

A

Someone(or a computer) methodically tries to gain access to a computer system, e.g. by trying all password combinations

25
Q

Definition of spyware

A

Data is being transmitted somewhere, and someone other than the intended recipient accesses the transmission and reads the data

26
Q

Purpose of antivirus software

A
  • when run, it scans a computer to find viruses and either removes them or quarantines them
  • Scans download files for viruses; warning the user of any present
27
Q

Definition of a hacker

A

A person who attempts to gain unauthorised access to a computer system

28
Q

Purpose of anti-virus spyware software

A
  • When run, it scans a computer to find spyware and either removes it or quarantines them
  • Scans downloaded files for spyware; warning the user of any present