Network Security Flashcards
Explain Malware
Viruses - installed without your knowledge. It embeddes itself into other programs infecting and slows down the computer
Worms - is a standalone program that doesn’t attack itself to an existing program in order to spread.
Trojan - The user is usually invited to click on a link which then executes the programs.
Explain Social Engineering
Phishing - used to get confidential information that can be used to gain access to bank accounts.
Human error - humans are the weakest points in security hackers have engineered methods to take advantage of human error and gulbility
Blagging - gets confidential information by recklessly obtaining this information.
This gives them info to personal computer files
Explain Brute force attacks
an attack that goes through every possible passwork or letters until the access is eventually gained.
This goes through every possible password
Explain Denial of Service attacks
is used to prevent the legitamate users from accessing the network. This is by flooding a company’s network of fake users. The network will soon be overloaded and can crash or appear to be unresponsive.
Explain Data interception and theft
Shouldering is a type of interception by looking over somebody’s shoulder whilst they are entering passwords or Pins.
To prevent Data theft you could destroy paper documents once they are no longer needed or file them away in a secure place.
Log off your computer when you walk away.
If possible lock the room containing the computer.
Explain a SQL injection
It exploits security weaknesses in a website by inserting malicious code into a database field on a website. This may be designed to steal credit card information, and confidential information
Explain Penetration testing
Penetration testing is used to find any weaknesses in a system. This is by gathering any information about the target of possible attacks, indentifying possible entry points, attempting to break in and finding any bugs.
Explain Anti-Malware Software
it prevents harmful programs from being installed on the computer, it prevents important files such as operating systems, from being changed or deleted, it will do regular scans for any viruses which have passed the software.
Explain firewalls
It is designed to prevent any unauthorised access to a private network. All messages entering or leaving a pass through, to examine if the messages meet a standard.
Explain User access levels
Users access levels are set for disks,folders and files so that people can access what they need to and not more than that they should.
Explain Password protection
You should make a strong username and password and never share it with anybody.
Explain Encryption
There are devices which can intercept data being transmitted over cables so the data should be encrypted so that no successful unauthorised access is given to anybody
Explain Physical Security
CCTV cameras should be used to detect intruders. There should be security locks so that on legitimate people should enter.