Network Security And System Software Flashcards

1
Q

Name three types of malware

A

Viruses, Trojans, Ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Name 4 prevention methods

A

Anti-malware, Anti-virus, Encryption, Acceptable Use Policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Define Malware

A

Malicious Software; Executable programs run on a computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What do viruses do?

A

Infect computers; Replicate their code in other programs, infect other computers, delete, corrupt and modify files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does a worm do?

A

Replicates itself in order to spread to other computers; Cause damage, slow down network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a computer Trojan?

A

They have a program, game or cracked file which is something the user wants; they have a negative program code which causes damage, takes control or provides access to the computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is ransomware?

A

Software that holds a computer hostage by locking or encrypting access; once a random is paid, access is restored

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Name two ways that hackers can exploit technical vulnerabilities

A

Unpatched software; if updates are not downloaded the software can become vulnerable
Out of date Anti-Malware; won’t be able to detect the latest viruses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is social engineering?

A

The ability to obtain confidential information by asking people for it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is shoulder surfing?

A

The ability to get information or passwords by observing as someone types them in; Looking over someone’s shoulder, using a CCTV camera

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is phishing?

A

Social engineering, normally an email but can be a text or call, pretending to be a bank or website; trying to get usernames, passwords, credit card details

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How can you find a phishing email?

A
  • Greetings; the phishes don’t know your name so the greeting isn’t personalised
  • Senders address; normally a variation of a genuine address
  • Forged link; the link looks genuine but may not link to the website given
  • Request for personal information; genuine organisations never do this
  • Sense of urgency; criminals try to persuade you that something bad will happen if you don’t act fast
  • Poor spelling and grammar
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a Denial of Service (DoS) attack?

A

A hacker will use or infect a computer so that:
It sends as many requests to the server as possible (known as a flood)
The server can’t respond fast enough so slows down or goes offline

In a Distributed Denial of Service (DDoS) attack many computers are used to send requests

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a Man In The Middle (MITM) attack?

A

Allows the attacker to intercept communications between the user and server. The attacker can then:
Eavesdrop to find passwords and personal information
Add different information to a web page or other communications such as emails

Connecting to an unencrypted Wi-Fi makes it easy to perform a MITM attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How can a USB be used to infect a computer?

A

An unsuspecting employee may pick up a USB from a company car park and insert it into their computer. The malware can now install onto the computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Give a real life example of data theft

A
  • 2014
  • The details of 125,000 students from Staffordshire University were stolen from a laptop left in a car
17
Q

Name three ways to protect your mobile phone

A
  • Use password features
  • Do not follow suspicious links
  • Research apps before downloading them
18
Q

What is a Brute Force attack?

A

A hacker will try every combination of password until the correct password is found; a computer is usually used to do this as it can try millions of passwords per second

19
Q

What is an SQL injection?

A

Takes advantage of web input forms to access or destroy data

20
Q

Name five ways to prevent vulnerabilities

A
  • Penetration testing
  • Anti- malware
  • Firewalls
  • User access levels
  • Physical security
21
Q

What is penetration testing?

A

The practice of deliberately trying to find security holes in your own systems

22
Q

What does anti-malware do?

A

Will detect malware such as viruses, worms, trojans and spyware

23
Q

What happens when a new virus is detected?

A

It is entirely to the anti-virus company. They verify it is malware then create a signature of the virus. They then add it to the virus database and tell computers to run an update.

24
Q

Why is it hard to create a signature for a virus?

A

They can morph to avoid detection

25
Q

What is encryption?

A

A way of securing data so that it can only be read with a key

26
Q

How are individual files encrypted?

A

Files are encrypted individually using a password. Only people with the password can read the file