Network Security Flashcards

1
Q

Explain Malware

A

Viruses - installed without your knowledge. It embeddes itself into other programs infecting and slows down the computer
Worms - is a standalone program that doesn’t attack itself to an existing program in order to spread.
Trojan - The user is usually invited to click on a link which then executes the programs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Explain Social Engineering

A

Phishing - used to get confidential information that can be used to gain access to bank accounts.
Human error - humans are the weakest points in security hackers have engineered methods to take advantage of human error and gulbility
Blagging - gets confidential information by recklessly obtaining this information.
This gives them info to personal computer files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Explain Brute force attacks

A

an attack that goes through every possible passwork or letters until the access is eventually gained.
This goes through every possible password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Explain Denial of Service attacks

A

is used to prevent the legitamate users from accessing the network. This is by flooding a company’s network of fake users. The network will soon be overloaded and can crash or appear to be unresponsive.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Explain Data interception and theft

A

Shouldering is a type of interception by looking over somebody’s shoulder whilst they are entering passwords or Pins.
To prevent Data theft you could destroy paper documents once they are no longer needed or file them away in a secure place.
Log off your computer when you walk away.
If possible lock the room containing the computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Explain a SQL injection

A

It exploits security weaknesses in a website by inserting malicious code into a database field on a website. This may be designed to steal credit card information, and confidential information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Explain Penetration testing

A

Penetration testing is used to find any weaknesses in a system. This is by gathering any information about the target of possible attacks, indentifying possible entry points, attempting to break in and finding any bugs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Explain Anti-Malware Software

A

it prevents harmful programs from being installed on the computer, it prevents important files such as operating systems, from being changed or deleted, it will do regular scans for any viruses which have passed the software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Explain firewalls

A

It is designed to prevent any unauthorised access to a private network. All messages entering or leaving a pass through, to examine if the messages meet a standard.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Explain User access levels

A

Users access levels are set for disks,folders and files so that people can access what they need to and not more than that they should.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Explain Password protection

A

You should make a strong username and password and never share it with anybody.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Explain Encryption

A

There are devices which can intercept data being transmitted over cables so the data should be encrypted so that no successful unauthorised access is given to anybody

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Explain Physical Security

A

CCTV cameras should be used to detect intruders. There should be security locks so that on legitimate people should enter.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly