Network Security Flashcards

1
Q

why is no network completely immune to security threats

A
  • because as organisations develop new security measures

- hackers develop new ways around them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what is the role of network security

A

to minimise the chances of unauthorised access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what is cyber security or network security

A

protecting computers from threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

how is good cyber security build from the ground up

A
  • as code is being developed for any program
  • it should be checked my multiple people
  • code reviews can help to avoid the problems a code might have
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

what are the questions that should be asked when asking multiple people to check developing code in terms of its cyber security

A
  • would it be possible for an outside user to abuse this code
  • does it contain any vulnerabilities
  • is the programmer leaving a back door for someone to enter the system later
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

what should a code be robust enough

A

to only provide data to those who are authorised to receive it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what does validation involve and how does it do this

A
  • it involves checking the user is who they say they really are
  • this can be done through a password or biometric measure
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

what does authentication involve and how does it do this

A
  • it involves ensuring the user is entitled to access what they are trying to reach
  • like you would not want a costumer to be able to view employee data
  • but you want them to view their own account
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

why is useful to make sure that a human being rather than a machine is using the computer

A

because a lot of cyber attacks are carried out by computers and programs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

what are the two examples of a system making sure that a human is using a computer rather than a computer and how does it work

A
  • captcha
  • where a blurry or difficult to read set of characters have to be entered
  • or have a user verify an access attempt
  • by having the user click on a link in an e mail
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

what is the effect of a software being installed in a system regarding hackers

A
  • hackers have an opportunity to introduce viruses

- or attempt SQL injection attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

what do security patches do and why are they made

A
  • they protect against identified security threats

- developers create them to combat the hacking of software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

why should someone download the most recent and most secure version of a program and anti malware software

A

because the most recent version is needed to deal with the most recent malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

what is ethical hacking or penetration testing

A

when an individual attempts to hack into a system with a view to identifying weaknesses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

who do ethical hackers work with and what is their significance

A
  • they work with software developers

- and their findings allow for the production of more secure programs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

what are network forensics

A

using software to track the identities of anyone trying to access the system

17
Q

what do network forensics allow us to do

A
  • although they dont prevent the penetration of a software
  • they allow for the perpetrators to be identified and caught
  • which prevents future attacks
18
Q

what is the low tech solution to cyber attacks

A
  • the use of network and policy documents
  • it spells out hat network users can and cant do
  • and cover factors such as password complexity or a guidance on e mail attachments
19
Q

what is are the three ways that you can increse the protection of a system

A
  • use firewalls to prevent unauthorised access to sensitive information
  • use anti malware to detect and remove viruses or spy ware trying to infect the system or do sql injections
  • use encryption so that interceptes data can’t be used or read