network security and threats Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

what is a firewall

A

a firewall is a device designed to prevent unauthorised access to a network

firewall consists of two network interface cards (NICs) between the user and the Internet.

The firewall passes the packets between these two NICs and compares them against a set of rules set by the firewall software. The preconfigured rules are called packet filters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

packet filtering

A

one method firewalls use is packet filtering
-this checks details in a packet header such as it’s source and destination ip addresses , port number and the protocol it is running

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

proxies

A

intermediaries between two devices communicating , collecting and sending data on behalf of the user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

benefits of using proxies

A
  • The privacy of the user is protected and they remain anonymous
  • The proxy server can cache frequently used website data making it faster to load
  • Proxies can reduce overall web traffic
  • Can be used by administrators to prevent access to sensitive or irrelevant
    information at work or at school
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

encryption

A

Encryption is a way of keeping data secure when transmitting it over the Internet. Encryption makes data unreadable if it is intercepted. Data is encrypted and decrypted using a set of keys.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

monitoring

A

can protect against the threat of hacking , can introduce malware

  • can be used to protect against the threat of malware and hacking
  • packet sniffers
  • user access logins
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

prevention

A

up to date patches to the operating system and application programs reduce vulnerabilities in the system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

threats

A

malware = hostile instrusive software (used in active attacks)

viruses = insert themselves in normal programs , so when the host program gets executed , so does the virus

worm = like viruses but spread autonomously , due to them spreading so quickly , they can overload networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

threats

A

trojans = installed on a computer disguised as desirable software.

spyware - collects data about activities in the computer , then sends it back to the attack instigator

phishing = obtaining sensitive information by disguising
the message and link as a trustworthy source.can contain malware

an example of social engineering , which explains the fact that people often the weak points systems by manipulating them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

explain how the use of a proxy server may make access to websites for users

A

a proxy can maintain a cache of websites commonly visited and return the webpage data to the user immediately without reconnections to the internet.this speeds up access to websites

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

describe the term firewall (exam question)

A

a hardware device that monitors packets going to and from a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

state why the architect firm would use firewall (exam questions)

A

prevents unauthorised access to a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly