Network Security Flashcards
What is malware?
Software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system
Name 6 types of malware
- Ransomware
- Spyware
- Adware
- Trojan
- Virus
- Worms
What is ransomware?
Malware where the hacker will prevent you from accessing your data until a ransom is paid
What is spyware?
A program that monitors user activities and sends the information back to a hacker
What is a trojan?
Malware that downloads onto a device disguised as a legitimate program
What is a computer virus?
Self replicating malware that often causes damage by deleting or modifying data
What is a worm?
Self replicating malware often not causing damage until it reaches it’s intended target
What technical vulnerabilities could a computer have that a hacker could exploit if not dealt with?
- Unpatched software
- Out of date anti malware
What is unpatched software?
Software that hasn’t been updated to the latest standard.
What is social engineering?
Deception to try to gain personal information
Name 2 examples of social engineering
- Phishing
- Shoulder surfing
What is phishing?
Emails that try to trick users into giving away personal details
What is shoulder surfing?
The ability to get information or passwords by observing as someone types them in
Describe 2 examples of shoulder surfing?
- Looking over someone’s shoulder
- Using a CCTV camera
What indicators are that an email is a phishing email?
- They don’t say your name
- Strange email address
- A forged link
- Requesting personal information
- A sense of urgency
- Poor spelling and grammar
What is a brute force attack?
Trying all possible passwords until the correct one is found
What is a Denial of Service (DoS) attack?
Flooding a server or network with pointless requests so that it either fails or slows down
What is Distributed Denial of Service (DDoS) attack?
A DoS attack using multiple devices (zombies) to send requests
What is data interception and theft?
Stealing data or intercepting it with a man-in-the-middle attack
What is a SQL injection?
Typing code into a website to break into the database to retrieve information
What is penetration testing?
Hacking your system to test for vulnerabilities, which will then be fixed
What is a network policy?
A policy that provides rules and guidelines on what network users can and cannot do
What are user access levels?
Different levels of permissions given to users to access facilities on a computer
What is encryption?
Converting readable data to an encoded version that can only be decoded with a key
What is anti-malware software?
A type of computer program which detects, prevents and removes malware on a system
What is a firewall?
A tool that monitors traffic going in and out of a network and either allows it to pass or blocks it
What is network forensics?
Monitoring traffic on a network to help identify invasive traffic from hackers or to determine where data is being sent.
What methods can be used to keep a network safe?
- Penetration testing
- User access levels
- Secure passwords
- Encryption
- Anti-malware software
- Firewalls
- Physical security
How might a hacker try to guess the correct password in brute force attacks?
Using a list of most common passwords
How can you help protect against a brute force attack?
- Using strong passwords
- Change your password regularly
- Strong network policies
- Progressive delays
- Lock out code
- Challenge response
What are progressive delays?
Only allow subsequent attempts after a given amount of time for putting your password in
What is a lock-out code?
Only allowing a small number attempts of putting your password in, then the user will be locked out of the system
Give an example of a challenge response?
‘I’m not a robot’
What is spear phishing?
Phishing with an intended target
What is the purpose of anti-malware?
To detect, prevent and remove malware
What is a disadvantage of anti-malware?
- It can only detect known malware
- The longer time a user has gone without updating their anti-malware, the less effective it will be
What is more effective? Hardware-based firewalls or software-based?
Hardware-based, but it is more expensive
What is physical security?
Using physical means to prevent network threats
Name some examples of physical security
- CCTV
- Alarms
- Door locks
- Fences
- Security guards