Network Security Flashcards
why is no network completely immune to security threats
- because as organisations develop new security measures
- hackers develop new ways around them
what is the role of network security
to minimise the chances of unauthorised access
what is cyber security or network security
protecting computers from threats
how is good cyber security build from the ground up
- as code is being developed for any program
- it should be checked my multiple people
- code reviews can help to avoid the problems a code might have
what are the questions that should be asked when asking multiple people to check developing code in terms of its cyber security
- would it be possible for an outside user to abuse this code
- does it contain any vulnerabilities
- is the programmer leaving a back door for someone to enter the system later
what should a code be robust enough
to only provide data to those who are authorised to receive it
what does validation involve and how does it do this
- it involves checking the user is who they say they really are
- this can be done through a password or biometric measure
what does authentication involve and how does it do this
- it involves ensuring the user is entitled to access what they are trying to reach
- like you would not want a costumer to be able to view employee data
- but you want them to view their own account
why is useful to make sure that a human being rather than a machine is using the computer
because a lot of cyber attacks are carried out by computers and programs
what are the two examples of a system making sure that a human is using a computer rather than a computer and how does it work
- captcha
- where a blurry or difficult to read set of characters have to be entered
- or have a user verify an access attempt
- by having the user click on a link in an e mail
what is the effect of a software being installed in a system regarding hackers
- hackers have an opportunity to introduce viruses
- or attempt SQL injection attacks
what do security patches do and why are they made
- they protect against identified security threats
- developers create them to combat the hacking of software
why should someone download the most recent and most secure version of a program and anti malware software
because the most recent version is needed to deal with the most recent malware
what is ethical hacking or penetration testing
when an individual attempts to hack into a system with a view to identifying weaknesses
who do ethical hackers work with and what is their significance
- they work with software developers
- and their findings allow for the production of more secure programs