Network Security Part 2 Flashcards
What is a backdoor in relation to network security?
A path into the network that is not protected. This can be installed by a “client program” or be a vulnerability in the system.
How can a user remove backdoors and what should they do after detection/removal?
To remove a backdoor a user might use:
1) an antivirus software scanning solution
2) clearing harmful programs from the system
After detection/removal:
1) software updates should be performed
2) All passwords should be changed
What is buffer overflow?
Buffer overflow happens when a program attempts to store more data than available in the buffer memory. This causes data in adjacent buffers to corrupt.
What is denial of service?
Denial of service attacks prevent sites from carrying out their function by saturating the site with external communication requests limiting the site’s resources.
What 2 categories do DoS attacks fall into?
1) Buffer overflow attacks: causes machine to consume all available hard disk space, memory or CPU time
2) Flood attacks: saturates the server with an overwhelming amount of packets
What is malware?
Malicious software designed to corrupt your system
What is phishing?
Collection of sensitive information by posing as a friendly entity.
What is a Trojan Horse?
A class of malware that gives a hacker remote control of your system. Can also contain viruses and worms.
What is a virus?
Hidden in self replicating code and needs a host
What is a worm?
A program that can run independently and replicate itself to infect other hosts in a network
What is a keystroke logger?
A program that runs in the background and logs all keystrokes. The keystroke data is then sent back to the hacker and is analyzed for sensitive information.
What is spoofing?
Masquerading as a friendly entity to entice a user to give out sensitive information
What is the difference between phishing and spoofing?
Spoofing masks as a legitimate user account in order to steal a user’s identity but phishing involves creating fake websites or email addresses to gain sensitive information.