Network security Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

What is network security

A

Activities designed to protect a network and its data from threats such as viruses, hacker attacks, denial of service attacks, data interception and theft and equipment failure
These activities protect data from threats to its confidentiality, correctness (integrity) and availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is confidentiality

A

A situation where you would expect something to be kept a secret

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are ways to protect data confidentiality

A

Ensuring only authorized users can access the parts of a network and its resources that they have reason to require, such as data (storage), internet connection
Stopping misuse- even users who have been given permission to access to a network might deliberately or accidently access data without proper permission
Encrypting data- encrypted data cannot be read without the encryption key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is correctness/integrity

A

Data stored should not be changed without proper authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Availability, why might a network fail

A

Hardware failure
Program code might get corrupted
Virus attack
Denial of Service (DOS) attakcs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What can DOS attacks do?

A

Slowdown network performance or stop it all together
Delete data
Alter data or program code
Allow data to be stolen or eavesdropped on

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the reasons why security is important

A

Required for the smooth and efficient running of a organization
Private and confidential- data that people or business would not want to make public. There is legal requirement to keep personal data secure and if data is leaked the company can be sued
Financially valuable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are methods used to secure a network

A

Authentication
Access control
Firewall
Physical security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is authentication

A

Process of checking the identify of a user of a computer system or network often done by validating a username and password against details stored on a central computer/server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are some methods of authentication

A

PIN (personal identification number)
Fingerprint recognition
Two-factor authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is two-factor authentication

A

A security check where users have to type in the code from a portable hardware device called ‘secure token’ or from an SMS message sent to their mobile phones

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is access control

A

This is a method that control whether a particular user will gain access to a particular file

This will decide if user gets
-Read only access- only read the contents of the file but not modify or delete
-Modify access- read, alter, or modify and write/save the changes to the file
This prevents accidental or deliberate erasing or modifying of data
Access controls are set up by an organistion’s system administrators according to the management’s requirements- according to the user’s duties and responsibilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is Firewall

A

Monitors and controls data that is moving from one network to another. It sits between the internet and the local internal network
This can be software or hardware or a combination of both
It inspects incoming and outgoing data and uses a set of rules (often known as firewall policy) to decide whether to allow the data or not
The organisations can customize the rules do the firewall is suitable for their particular circumstances
These rules can
-Stop certain protocols from being used e.g. FTP to prevent data being copied from an external server
-Block data coming from or going to certain network addresses
-Stop hacking the internal server

Individual computers are likely to have software firewalls installed with some default riles to protect from common threats
LAN and internet connection likely to have hardware based firewall because these are much more flexible in terms of the rules that can be applied and allow faster throughput of data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is Physical security

A

Ensures that critical parts of a network can only be physically accessed by authorized people

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is cloud storage security

A

Cloud storage provider needs to ensure
-that data is accessible and they maintain the system
-availability of extra storage
-Data is protected
-Maintain backups

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are some cloud security disadvantages

A

Risk of hacking
Need a reliable high speed internet connection

17
Q

Cyber attacks

A

Any kind of electronic attack on a computer system, server, network or other IT device
These might be designed to
-gain access to data in the system
-delete or modify information
-make sure system is unavailable for use
-Physically damage a device

18
Q

What is social engineering, its types

A

Any kind of attack on a computer system or network that takes advantages of how people behave and respond to certain situations
Phishing- attempting to get confidential information by sending a user a message (email or fake website that looks legitimate) that appears to come from a trustworthy person or organisation
Pharming- directing internet users to a fake website that looks like a real one, in order to obtain personal/confidential information such as account numbers or passwords
Shoulder surfing- gaining access to information by watching someone enter it (PIN/Password) into a computer system

19
Q

What should the user do to prevent pharming

A

Check the URL of the site
Check that there is a secure connection-HTTPS
Install the latest security updates
Install antivirus software

20
Q

What are other forms of cyber attacks that rely on technical weaknesses such as

A

Unpatched software- software that has not had the latest security updates applied to it, making it vulnerable to attack
Eavesdropping-intercepting data being sent to/from another computer system
USB device-might contain malware that could be transferred to the system