Network Security Threats Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

Different forms of network attacks

A

Passive
Active
Insider
Brute force
Denial-of-service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Passive Attack

A

When hackers monitor data travelling on a network using packet sniffers to find sensitive data
Best defense: Data encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Active Attack

A

Malware
Best defense: firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Insider Attack

A

Someone within an organization uses their access to steal information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Brute Force

A

Automated software used to generate hundreds of likely passwords to crack it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Denial-of-service

A

Hacker floods network with useless traffic making it impossible to access the website

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is malware?

A

A software installed on a persons device without their consent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Examples of actions of malware

A

Deleting files
Spyware: secretly monitors users
Locking files and hacker asks for money in exchange to give the decrypt key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How can malware access your device?

A

Trojans: Disguised as legitimate software
Viruses attach to certain files: activated when user opens the file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the weak point of a secure system?

A

People

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is social engineering?

A

Way of gaining illegal access to network by influencing employees of the company

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Types of social engineering

A

Telephone - hacker pretends to be from the company and employee discloses sensitive information

Phishing - Hackers send emails pretending from a legit company which contain links asking for personal information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is SQL injection?

A

Pieces of SQL typed into input box which reveals sensitive information

Can be used when SQL code of a website is insecure - easy to pass website’s firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Ways to prevent network vulnerabilities

A

Penetration Testing
Passwords
Physical Security
User Access Levels
Anti-Malware Software
Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Penetration Testing

A

Organization employs specialists to stimulate possible attacks on a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Passwords

A

Strong characters with combination of letters, symbols and numbers

17
Q

Physical Security

A

Locks on server rooms
Security Cameras

18
Q

User Access Levels

A

Only give higher access level to very few people + if neccessary

19
Q

Anti-Malware Software

A

Stops malware

20
Q

Encryption

A

Encrypt data