Network Security Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

Spyware and keyloggers

A

Software hides on computer recording keystrokes to send back to 3rd party- analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Virus

A

Attaches itself to programs or files on a computer or server and can affect all components of an operating system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Worms

A

It replicates itself in order to spread to other computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Trojan

A

Malicious computer program that is designed to access a computer by misleading users of its intent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Purpose of Social Engineering

A

Is used to gain unauthorised access to a computer system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Phishing

A

This method is a direct phone calls or emails that pretend to be an official service. People asked for bank details, pin

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Brute Force Attack

A

Attempt to crack a password or username using trial and error and using as many combinations as possible

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Purpose of brute force attack

A

To steal data or cause further harm.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Denial of Service Attack (DoS)

A

It sends as many requests to the server as it can aka flood
The server can’t respond fast enough so slows down or goes offline

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Distributed Denial of Service Attack (DDoS)

A

Many computers are used to send the requests

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Man- in- the- middle attack (MIT)

A

Allows the attacker to intercept communications between the user and server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Purpose of data interception and theft

A

Gain personal information to fraudulently gain access to accounts of innocent people. Once access has been gained, the account is either used to attack others, or money is transferred to a third party without the owners knowledge or consent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Penetration testing

A

Practice of deliberately trying to find security holes in your own system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the goal of Penetration Testing

A
  • Identify targets of potential attacks
  • Identify possible entry points
  • Attempt to break in
  • Report back the findings
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Anti- malware software

A

To detect malware that has been installed.
To prevent malware from being installed.
To remove malware from the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How does anti- malware work?

A
  • When a virus or new malware is detected it is sent to the anti- virus company
  • They verify it is malware then create a signature of the virus
  • They then add it to their virus database and tell computers to run an update
17
Q

Firewalls

A

Performs a ‘block’ between a potential attacker and the computer system

18
Q

User Access Levels

A

Allow a system administrator to set up a hierarchy of users who have different permissions when they access different parts of the system.

19
Q

Encryption

A

Where data is translated into code so that only authorised users, or users with the key can decrypt and read. Users must have the key in order to decrypt the coded file.

20
Q

Physical Security

A

Where hardware, software and networks are protected by physical methods - e.g CCTV, locks

21
Q

Software Patches

A

Fix known security problems in software but also notify cyber- criminals that there was a problem so anybody NOT uploading the latest patch is vulnerable

22
Q

Network Forensics

A

Specialist area that involves monitoring and examining data to discover the source of security attacks and other illegal activities