Network Security Flashcards
Define social enngineering
List the types of social engineering
Social engineering targets its attack on the network users, usually tricking them into leaking sensitve infomation that will allow attacker to access protected parts of network.
Methods: Phising, Identity fraud
Define the three principles of network security
Confidetiality - data is protected from unauthorised access
Integrity - data is protected from unauthroised changes
Availability - data is accessible by those with authority
Define the three security processes
Authentication - verify who the users really say there are
Authorisation - ensure that the users have permission to access/modify data
Accounting - process and track record activities and action taking place on the network
Explain (Distributed)Denial of Service (DDoS/DoS) attacks
Purpose:
- meant to shut down machine or network and make it inaccessible for intended users
How:
- hacker infiltrates multiple multiple hosts to form a botnet (DDOS)
- attacker uses a botnet to flood the network with requests from different computers
- all TCP connections are used up (DOS)
- triggering a crash
How DOS:
1. DoS works by sending requests at a rate higher than what the server can handle
1. Server is compromise as it is unable to respond to legitimate requests made by actual users
Explain Bot and Botnet
Bot
- is malware which connects to a central server,
- often to send data and recieve instructions from the server
- allows attacker to use the bot to coordinate larger scale attacks as a part of a botnet
Botnet
- collection of internet connected devices infected by malware that allows hackers to control them
What is Spyware?
Spyware
- is a type of malware that runs in the background of host computers, recording user activity and actions, where data is sent back to attacker
What is a Trojan?
Trojan
- is a malware that disguises itself as an innocent program to trick the users into opening it
What is Ransomeware?
Ransomeware
- is a malware that encrypts data on the host computer, rendering it unsuable for the users
- the data can only be decrypted if the user pays the demanded ransome amount
What is a keylogger?
Keylogger
- is malware that runs in the background of host computers, recording users keystrokes and mouse movements, where data is sent back to attacker
Explain how Accounting can be acheieved
Accounting
- System logs; records activities on computer
- Network logs; records source and destination IPs of data recieved and sent in the network
Explain how Authentication can be acheieved
Authentication
- Passwords
- Multifactor authenthication with the use of OTPs and security token(physical keys)
- digital certificates
Explain how Authorisation can be acheieved
Authorisation
- Account controls; only administrator acc have access to root file directories
- Firewall; ensure that users who violates rules cannot access the network
What is a data breach?
How is it done?
Data breach occurs when a hacker is able to access infomation stored on a server without requiring authorised access.
This can be done through
- Cross Site Scripting; load malicious scripts on website
- Sript Injection (SQL injection); enters queries into websitees which does not validate the input, thus returning sensitve data
What is a worm?
Worm
- is a standalone program that replicate itself to other host systems
What is a virus?
Viruses
- are program binaries/executable scripts that
- attach themselves to other files or programs to replicate themselves to other host systems