Network Security (1.4) Flashcards
1
Q
What is a passive attack
A
- monitoring data across network and intercepting any sensitive information they find (through the use of network monitoring hardware and software)
2
Q
What is a active attack
A
- Attacking a network with malware or other planned attacks
3
Q
What is an insider attack
A
- an insider who exploits their network to steal/expose information
4
Q
What is a brute force attack
A
- Trying to gain access by using many password combinations (using automated software)
5
Q
What is a denial of service attack (DoS)
A
- Stopping users from accessing part of a network by flooding the network with many requests
6
Q
What is malware
A
- malicious software which causes damage (e.g. Editing/deleting files) when it is run
7
Q
What is phishing
A
- luring people into giving personal data through email/SMS messages sent from source that looks legitimate
8
Q
What is pharming
A
- redirects network traffic to a fake website which is intended to collect persona;/sensitive data
9
Q
What is social engineering
A
- the art of manipulating people into giving up their personal/sensitive data
10
Q
What is data interception and theft
A
- data sent to another device is intercepted by a 3rd party (unauthorised user)
11
Q
What is the concept of SQL Injection
A
- inserting malicious SQL statements into a database to edit/steal personal data
12
Q
What is poor network policy
A
- limited/no security rules to follow so easier for unauthorised users to gain access to data (e.g. no access rights, no back up of data etc)
13
Q
What are weak passwords
A
- passwords that do not consist of upper/lower case characters, minimum length requirement, symbols and are not updated regularly
14
Q
What is out of date software
A
- software prone/not protected from the latest threats and malware
15
Q
What is ransomware
A
- prevents access to files and data unless a ransom is paid to the hacker/3rd party
16
Q
What is penetration testing
A
- testing the vulnerability of a network by paying authorised users (internal or external) to try and find weaknesses to exploit, and then fixing these to improve network security.
17
Q
What is physical security
A
- having physical restrictions, such as ID cards, locks and keys to ensure sensitive data cannot be leaked/stolen
18
Q
What are network policies
A
- having thorough sets of rules in place to reduce the chances of employees giving accidental or deliberate access to data
19
Q
What is anti-malware software
A
- downloading an active program which protects data from malware by blocking malware from entering a system/network or finding and deleting/quarantining the malware to reduce impact
20
Q
What are Firewalls
A
- monitors incoming and outgoing network traffic to protect against unauthorised connections to/from the internet
21
Q
What do user access levels do
A
- granting different levels of access based on role in company to prevent access to sensitive/personal data
22
Q
What is a password
A
- string of characters used to verify the identity of a person trying to gain access to a system/data (preventing unauthorised access)
23
Q
What is encryption
A
- using algorithms to change the form of data sent across a network to make it difficult for unauthorised users to access or recognise, and can only access using the encryption key