Internet Security Flashcards

1
Q

what is a firewall

A

a combination of hardware and software that isolates an organisations internal network from the internet, allowing some packets and blocking others

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what are two techniques a firewall will use

A
  • packet filtering - examines packet headers and blocks or allows traffic based on predefined rules
  • sateful inspection - examines the actual data of the packet. if there is no malicious code in the paxcket it will be accepeted or if the packet is part of data being sent where packets have already been recieved
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what is a proxy server

A

provides internet access to other computers on the network but is mostyly deployed to provide safety. it controls the information going in and out of the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

give the steps of a proxy server

A
  • receives a request from a client inside the firewall
  • sends this request to the remote server outside of the firewall
  • reads the response
  • sends it back to the client
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

what is encyrption

A

uses an algorithm to convert a message into a form that is not understandable without the key to decrypt it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

what is symmetric encyption

A

the same key is used to encyrpt and decrypt a message

  • it is fast but requires a secure way to share a key
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what are the problems with symmetric encryption

A

the key must be sent with the message so it is vulnerable to interception

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

what is asymmetric encyrption

A

one key is made publicily available and the other way is kept secret by its owner.
* public key is used to encrypt a message and the private key is used to decrypt the message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

the communication will be made more secury by the use of a ……. attached to the end of the message

A

digtal signature

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

what does a digital signature do

A

confirms the identity of a sender and detects if a message has been changed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

explain how to produce a digital signature

A
  • the message is hashed into a message digest whihc is encrypted with the senders private key
  • this is transmitted with the message
  • the receiver decrypts the signature using the senders public key
  • recalculate the hash from the received message
  • compares the two hashed and if the match the message is authentic and unchanged
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

what is a computer virus

A

attaches itself to a program or file enabling it to spread from one computer to another, leaving infections as it travels

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a digital certificate?

A

A file issued by a Certificate Authority (CA) that verifies the owner of a public key, ensuring secure communication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

what enables a virus to spread

A

a virus cannot be spread without human interaction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

what is a worm

A
  • subclass of a virus
  • worms spread from computer to computer but unlike a virus it the capability to travel without any human interaction
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

what is a trojan horse

A
  • will appear to be useful software but will do damage once installed
  • those on the receiving end of trojan horse are usually tricked into opening them because they appear to be legitimate
  • when activated, the results can vary from beungannoying (changed icons) to seriius damage (removing information)
17
Q

whats the difference trojan horse has compared to viruses and worms

A

trojan horses do not reproduce by infecting other files nor do they self replicate

18
Q

How can improved code quality, monitoring, and protection help prevent malware?

A
  • secure code practices reduce vulnerabilities
  • monitering can detect susicious activity
  • protection (firewalls, antivirus) blocks threats before they spread
19
Q

explain 4 different ways that a firewall can protect computers on a LAN (4 marks)

A
  • packet filtering - inspects the packet headers and blocks or allows pakcets based on predefined rules
  • stateful inspection - examines the actual data of the packet. if there is no malicious code in the paxcket it will be accepeted
  • identify unusual activity from the host
  • a log is kept which records the entire history
20
Q

A business is worried about malware attacks. Give three methods they can use to protect their systems. (3 marks)

A

Use antivirus software to detect and remove threats. (1 mark)

Regularly update software to fix security vulnerabilities. (1 mark)

Train employees on phishing and social engineering risks. (1 mark)