Network Security Flashcards
What is Malware?
Malware (Malicious Software) is installed on someone’s device without their knowledge.
Purpose: to steal data, cause harm, damage or destroy computers and computer systems.
Malware includes spyware, viruses, and ransomware.
- viruses that might damage files
- adware that causes pop-ups
- spyware that collects and shares login details.
What are the different types of Malware?
Viruses
Worms
Trojans
Spyware
Ransomware
What are Viruses?
Programs embedded (hidden) within other files. They replicate themselves and become part of other programs. Viruses often cause damage by deleting or modifying data. They need to attach to programs to spread and execute their malicious code.
What are Worms?
Programs similar to viruses except that they are not hidden within other files. Worms often spread through emails. They do not need to attach to programs to spread and cause damage, unlike viruses.
What are Trojans?
Programs which pretend to be legitimate but in reality are malware. They are often disguised as email attachments. Trojans cannot spread by themselves - instead they deceive a user into installing the program.
What is Spyware?
Programs that monitor user activities (such as websites visited, usernames and passwords used) and send the information back to a hacker.
What is Ransomware?
Programs that attempt to blackmail a user into making a payment to a hacker. Some types of ransomware do little but try to scare users into paying, while others go further - they encrypt documents and will not decrypt them until a ransom is paid.
What are some other forms of attack?
o Social engineering
o Brute-force attacks
o Denial of service attacks
o Data interception and theft
o The concept of SQL injection
What is Social Engineering?
Social Engineering is a way of gaining sensitive information or illegal access to networks by influencing people and ways of deception.
E.g sending fake emails
Purpose: gaining sensitive information or illegal access to networks
This often targets employees in large companies.
What is a Brute Force Attack?
Brute Force attacks use automated software to produce hundreds of username and password combinations.
Trial and error is used to access a system.
Purpose: To gain access to a system to modify or take data.
What is a Denial of Service (DoS) attack?
DoS attacks involve flooding the server with fake requests, making the website or network extremely slow and inaccessible to legitimate users.
Purpose: To cause disruption to a website.
What is Data Interception?
Data interception is sometimes called a ‘man in the middle’ attack or ‘passive attack’. It involves monitoring data on the network and capturing sensitive or personal data.
Purpose: To gain access to the transmitted data.
This type of attack can be very damaging as it exposes confidential information.
What is SQL injection?
Structured Query Language (SQL) injection involves typing SQL code into a website’s input box to access databases and reveal personal data.
Purpose: The attack could cause the website to shut down while it is fixed, or could gain access to data store on the website such as customer data.
What are some common prevention methhods?
o Penetration testing
o Anti-malware software
o Firewalls
o User access levels
o Passwords
o Encryption
o Physical security
What is Penetration Testing?
Penetration Testing is when organisations employ specialists to identify possible weaknesses in the network’s security.
Purpose: The purpose of penetration testing is to determine how resilient a network is against an attack.
What is Anti-malware Software?
Anti-Malware software is designed to find and stop malware from damaging a network and devices on it.
Purpose: Anti-malware has three purposes:
- to detect malware that has been installed
- to prevent malware from being installed
- to remove malware from the system
Anti-virus is a type of anti-malware.
What is the function of a Firewall?
Firewalls examine all data entering and leaving the network and block any potential threats.
Purpose: protecting a network or computer from unauthorized access and malicious traffic.
What are User Access Levels?
User Access Levels control which part of the network different groups of users can access.
Purpose: determine what different users can do within a system, ensuring data security and aligning access with user roles.
This limits the number of people with access to important data.
What is the purpose of Passwords in network security?
Passwords help prevent unauthorised users from accessing the network.
Passwords should be strong and changed regularly.
What is Encryption?
Encryption is when data is translated into a code that only someone with the correct key can access.
Purpose: to protect the confidentiality and integrity of data
Prevents unauthorised access.
Encrypted text is called ‘cipher text’.
What is Physical Security?
Physical security protects the network from intentional or unintentional damage, such as fire or flood.
Purpose: to protect computing resources and networks from unauthorized access, damage, or theft.
Examples include locks, cameras, and motion sensors.