Internet Security Flashcards
what is a firewall
a combination of hardware and software that isolates an organisations internal network from the internet, allowing some packets and blocking others
what are two techniques a firewall will use
- packet filtering - examines packet headers and blocks or allows traffic based on predefined rules
- sateful inspection - examines the actual data of the packet. if there is no malicious code in the paxcket it will be accepeted or if the packet is part of data being sent where packets have already been recieved
what is a proxy server
provides internet access to other computers on the network but is mostyly deployed to provide safety. it controls the information going in and out of the network
give the steps of a proxy server
- receives a request from a client inside the firewall
- sends this request to the remote server outside of the firewall
- reads the response
- sends it back to the client
what is encyrption
uses an algorithm to convert a message into a form that is not understandable without the key to decrypt it
what is symmetric encyption
the same key is used to encyrpt and decrypt a message
- it is fast but requires a secure way to share a key
what are the problems with symmetric encryption
the key must be sent with the message so it is vulnerable to interception
what is asymmetric encyrption
one key is made publicily available and the other way is kept secret by its owner.
* public key is used to encrypt a message and the private key is used to decrypt the message
the communication will be made more secury by the use of a ……. attached to the end of the message
digtal signature
what does a digital signature do
confirms the identity of a sender and detects if a message has been changed
explain how to produce a digital signature
- the message is hashed into a message digest whihc is encrypted with the senders private key
- this is transmitted with the message
- the receiver decrypts the signature using the senders public key
- recalculate the hash from the received message
- compares the two hashed and if the match the message is authentic and unchanged
what is a computer virus
attaches itself to a program or file enabling it to spread from one computer to another, leaving infections as it travels
What is a digital certificate?
A file issued by a Certificate Authority (CA) that verifies the owner of a public key, ensuring secure communication.
what enables a virus to spread
a virus cannot be spread without human interaction
what is a worm
- subclass of a virus
- worms spread from computer to computer but unlike a virus it the capability to travel without any human interaction
what is a trojan horse
- will appear to be useful software but will do damage once installed
- those on the receiving end of trojan horse are usually tricked into opening them because they appear to be legitimate
- when activated, the results can vary from beungannoying (changed icons) to seriius damage (removing information)
whats the difference trojan horse has compared to viruses and worms
trojan horses do not reproduce by infecting other files nor do they self replicate
How can improved code quality, monitoring, and protection help prevent malware?
- secure code practices reduce vulnerabilities
- monitering can detect susicious activity
- protection (firewalls, antivirus) blocks threats before they spread
explain 4 different ways that a firewall can protect computers on a LAN (4 marks)
- packet filtering - inspects the packet headers and blocks or allows pakcets based on predefined rules
- stateful inspection - examines the actual data of the packet. if there is no malicious code in the paxcket it will be accepeted
- identify unusual activity from the host
- a log is kept which records the entire history
A business is worried about malware attacks. Give three methods they can use to protect their systems. (3 marks)
Use antivirus software to detect and remove threats. (1 mark)
Regularly update software to fix security vulnerabilities. (1 mark)
Train employees on phishing and social engineering risks. (1 mark)