Network Security Flashcards
What are 7 common external threats to networks?
Viruses, worms, and Trojan horses
Spyware and adware
Zero-day attacks
Threat actor attacks
Denial of service attacks
Data interception and theft
Identity theft
What are Viruses, worms, and Trojan horses?
These contain malicious software or code running on a user device.
What are Spyware and adware?
These are types of software which are installed on a user’s device. The software then secretly collects information about the user.
What are Zero-day attacks?
Also called zero-hour attacks, these occur on the first day that a vulnerability becomes known.
What are Threat actor attacks
A malicious person attacks user devices or network resources
What are Denial of service attacks?
These attacks slow or crash applications and processes on a network device.
What are Data interception and theft
This attack captures private information from an organization’s network.
What is Identity theft
This attack steals the login credentials of a user in order to access private data.
What are basic security components for a home or small office network
There are 2 of them
Antivirus and antispyware
Firewall filtering
What does Firewall filtering do
Firewall filtering blocks unauthorized access into and out of the network. This may include a host-based firewall system that prevents unauthorized access to the end device, or a basic filtering service on the home router to prevent unauthorized access from the outside world into the network.
What does Antivirus and antispyware do
These applications help to protect end devices from becoming infected with malicious software.
Larger networks and corporate networks use antivirus, antispyware, and firewall filtering, but they also have other security requirements. What are they?
There are 4 of them
Dedicated firewall systems
Access control lists (ACL
Intrusion prevention systems (IPS)
Virtual private networks (VPN)
What does Virtual private networks (VPN) do
These provide secure access into an organization for remote workers.
What does Intrusion prevention systems (IPS) do
These identify fast-spreading threats, such as zero-day or zero-hour attacks.
What does Access control lists (ACL) do
hese further filter access and traffic forwarding based on IP addresses and applications.