Internet Security Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

Name 5 methods of internet security.

A
  • Firewalls
  • Stateful inspection
  • Encryption
  • Proxy servers
  • Packet filtering
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are firewalls?

A
  • They regulate the packets that pass through it, accepting or rejecting packets according to preconfigured rules
  • Can work as a proxy server performing packet filtering and stateful inspection.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is stateful inspection?

A
  • Stateful inspection examines a packets payload (instead of only the packets header) before deciding whether to allow it through the firewall.
  • Use a connection table to keep track of rules set by the network administrator
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are proxy servers?

A
  • A proxy server sits between a public network and a private network.
  • They hide the true network addresses of the sender from the recipient by using the IP address of the firewall rather than the sender’s private IP address
  • This enables privacy and anonymous surfing
  • Administrators can use proxy servers to filter the content users requests
  • Proxy servers can also keep a log of users requests
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is packet filtering?

A
  • It accepts or blocks packets attempting to pass through the firewall based on their source IP address or the protocol they’re using (show by their port number)
  • An administrator can specify specific IP addresses or protocols to block or use automatic filtering software that blocks suspicious packets.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is symmetric encryption?

A

In symmetric encryption, the sender and receiver share the same private key. The same key is used to encrypt and decrypt data sent between the two parties

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a major flaw in symmetric encryption?

A

-The sender and receiver must participate in a key exchange which can be vulnerable to interception.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is asymmetric encryption?

A
  • Each device has a pair of mathematically related keys, the private key is kept secret and the public key is shared on the Internet.
  • When a message is encrypted with a public key, only the corresponding private key can decrypt it
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How does asymmetric encryption avoid being vulnerable to interception.

A

-It uses a public and private, so there’s no key exchange, so the key can’t be intercepted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are digital signatures used for?

A

Used to verify

  • the identity of the sender
  • that the data has not been changed/corrupted during transmission.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What type of encryption do digital signatures use?

A

Asymmetric encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How are digital signatures created?

A
  • Using a hashing/checksum algorithm a digest of the message being sent is created (the digest is dependant on the contents of the message)
  • The digest is encrypted with the sender’s private key
  • The encrypted digest is appended to the message
  • The message + appended digest are encrypted
    with the recipient’s public key
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What happens when the recipient receives the message with the digital signature?

A
  • They decrypt it using their private key; leaving them with the decrypted message + encrypted digest
  • As the digest was encrypted using the sender’s private key, it can be decrypted using the sender’s public key.
  • This verifies the sender’s identity as only they have access to their private key.
  • The recipient then carries out the same hashing/ checksum algorithm on the message and checks
    if their result matches the decrypted digest.
  • If everything matches, the recipient can be certain of the sender’s identity and that the data hasn’t be changed
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a digital certificate used for?

A
  • It verifies ownership of a key pair used in asymmetric encryption
  • Can be used to check that a fake key pair isn’t being used by an imposter
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Who issues digital certificates and what 5 things do digital certificates contain?

A

Issued by certificate authorities, digital certificates contain:

  • a serial number
  • the owner’s name
  • an expiry date,
  • the owner’s public key
  • the certificate authority’s digital signature
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Name the three types of malware that can infect computers

A
  • Trojan horses
  • Worms
  • Viruses
17
Q

What are worms?

A
  • Worms are malware that can self-replicate between computers without the any user intervention.
18
Q

What are Trojan horses?

A
  • A Trojan is malware that is disguised as a benign file that users are tricked into opening.
  • Commonly spread as email attachments
  • Commonly open a backdoor to your computer that the trojan creator can exploit
19
Q

What are Viruses?

A
  • Viruses are self-replicating pieces of malware that rely on host files to spread copies of themselves between computers.
20
Q

How can we prevent malware?

A
  • By installing anti-virus software (they scan and remove suspicious files on a computer)
  • By updating software regularly
  • Training people about the risks of opening suspicious email attachments or links
  • Spam filtering
21
Q

What are two differences between viruses and worms?

A
  • Viruses require a host, worms don’t

- Worms do not generally hide themselves inside another file