Network Security Flashcards

1
Q

What is malware?

A

Malware (Malicious Software) is installed on someone’s device without their knowledge.

Malware includes spyware, viruses, and ransomware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is social engineering?

A

A way of gaining sensitive information or illegal access to networks by influencing people, such as employees in large companies.

Social engineering exploits human psychology rather than technical vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are brute force attacks?

A

Attacks that use automated software to produce hundreds of username and password combinations through trial and error.

Brute force attacks can be time-consuming and are often used against weak passwords.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a Denial of Service (DoS) attack?

A

An attack that involves flooding the server with fake requests, making the website or network extremely slow and inaccessible to legitimate users.

DoS attacks can significantly disrupt service and lead to financial losses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is data interception?

A

Sometimes called a ‘man in the middle’ attack or ‘passive attack’, it involves monitoring data on the network and capturing any sensitive or personal data.

Data interception can occur without the knowledge of the parties involved in communication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

List three examples of malware.

A
  • Spyware
  • Viruses
  • Ransomware

Each type of malware operates differently but generally aims to harm or exploit the user’s device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

True or False: Social engineering techniques rely on technical vulnerabilities.

A

False

Social engineering techniques exploit human psychology rather than technical flaws.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is SQL Injection?

A

Structured Query Language is one of the main coding languages used to access databases. SQL code is typed into a website’s input box which reveals personal data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Penetration Testing?

A

Pen Testing is when organisations employ specialists to identify possible weaknesses in the network’s security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Anti-Malware?

A

Anti-Malware software is designed to find and stop malware from damaging a network and devices on it. Anti-virus is a type of anti-malware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a Firewall?

A

Firewalls examine all data entering and leaving the network and block any potential threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are User Access Levels?

A

User Access Levels control which part of the network different groups of users can access. This limits the number of people with access to important data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the purpose of passwords in network security?

A

Passwords help prevent unauthorised users from accessing the network. Passwords should be strong and changed regularly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is encryption?

A

Encryption is when data is translated into a code which only someone with the correct key can access. Encrypted text is called ‘cipher text’.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is physical security in the context of network security?

A

Physical security protects the network from intentional or unintentional damage e.g. fire, flood.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are some examples of physical security measures?

A

Examples include: locks, cameras, motion sensors.