Network Security Flashcards

1
Q

What is Malware?

A

Malware (Malicious Software) is installed on someone’s device without their knowledge.

Purpose: to steal data, cause harm, damage or destroy computers and computer systems.

Malware includes spyware, viruses, and ransomware.
- viruses that might damage files
- adware that causes pop-ups
- spyware that collects and shares login details.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the different types of Malware?

A

Viruses
Worms
Trojans
Spyware
Ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are Viruses?

A

Programs embedded (hidden) within other files. They replicate themselves and become part of other programs. Viruses often cause damage by deleting or modifying data. They need to attach to programs to spread and execute their malicious code.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are Worms?

A

Programs similar to viruses except that they are not hidden within other files. Worms often spread through emails. They do not need to attach to programs to spread and cause damage, unlike viruses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are Trojans?

A

Programs which pretend to be legitimate but in reality are malware. They are often disguised as email attachments. Trojans cannot spread by themselves - instead they deceive a user into installing the program.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is Spyware?

A

Programs that monitor user activities (such as websites visited, usernames and passwords used) and send the information back to a hacker.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Ransomware?

A

Programs that attempt to blackmail a user into making a payment to a hacker. Some types of ransomware do little but try to scare users into paying, while others go further - they encrypt documents and will not decrypt them until a ransom is paid.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are some other forms of attack?

A

o Social engineering
o Brute-force attacks
o Denial of service attacks
o Data interception and theft
o The concept of SQL injection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Social Engineering?

A

Social Engineering is a way of gaining sensitive information or illegal access to networks by influencing people and ways of deception.
E.g sending fake emails

Purpose: gaining sensitive information or illegal access to networks

This often targets employees in large companies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a Brute Force Attack?

A

Brute Force attacks use automated software to produce hundreds of username and password combinations.
Trial and error is used to access a system.

Purpose: To gain access to a system to modify or take data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a Denial of Service (DoS) attack?

A

DoS attacks involve flooding the server with fake requests, making the website or network extremely slow and inaccessible to legitimate users.

Purpose: To cause disruption to a website.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Data Interception?

A

Data interception is sometimes called a ‘man in the middle’ attack or ‘passive attack’. It involves monitoring data on the network and capturing sensitive or personal data.

Purpose: To gain access to the transmitted data.

This type of attack can be very damaging as it exposes confidential information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is SQL injection?

A

Structured Query Language (SQL) injection involves typing SQL code into a website’s input box to access databases and reveal personal data.

Purpose: The attack could cause the website to shut down while it is fixed, or could gain access to data store on the website such as customer data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are some common prevention methhods?

A

o Penetration testing
o Anti-malware software
o Firewalls
o User access levels
o Passwords
o Encryption
o Physical security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is Penetration Testing?

A

Penetration Testing is when organisations employ specialists to identify possible weaknesses in the network’s security.

Purpose: The purpose of penetration testing is to determine how resilient a network is against an attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is Anti-malware Software?

A

Anti-Malware software is designed to find and stop malware from damaging a network and devices on it.

Purpose: Anti-malware has three purposes:
- to detect malware that has been installed
- to prevent malware from being installed
- to remove malware from the system

Anti-virus is a type of anti-malware.

17
Q

What is the function of a Firewall?

A

Firewalls examine all data entering and leaving the network and block any potential threats.

Purpose: protecting a network or computer from unauthorized access and malicious traffic.

18
Q

What are User Access Levels?

A

User Access Levels control which part of the network different groups of users can access.

Purpose: determine what different users can do within a system, ensuring data security and aligning access with user roles.

This limits the number of people with access to important data.

19
Q

What is the purpose of Passwords in network security?

A

Passwords help prevent unauthorised users from accessing the network.

Passwords should be strong and changed regularly.

20
Q

What is Encryption?

A

Encryption is when data is translated into a code that only someone with the correct key can access.

Purpose: to protect the confidentiality and integrity of data

Prevents unauthorised access.

Encrypted text is called ‘cipher text’.

21
Q

What is Physical Security?

A

Physical security protects the network from intentional or unintentional damage, such as fire or flood.

Purpose: to protect computing resources and networks from unauthorized access, damage, or theft.

Examples include locks, cameras, and motion sensors.