network seecurity Flashcards
pen testing
Penetration testing is testing to make sure that the system is secure from hackers or other malicious attacks. It is used to discover weaknesses or vulnerabilities in a system that could be exploited.
black box pen testing
Black-box penetration testing is designed to mimic an external attack on the system. The testing will assume that the attacker is unauthorised and has no knowledge of the system. The tester will use brute force methods and try to exploit well-known software vulnerabilities to get access to the system.
white box pen testing
White-box penetration testing is designed to mimic an attack from an insider who already has access to the system, and maybe has information about the way the system is configured and operates. This can help safeguard against the actions of someone who is inside the organisation and up to no good.
When anti-malware detects malware in a computer system, it generally has three options: ??
clean
quarantine
delete
cleaning files
If a file or program has been infected but you still need the file, it is sometimes possible to clean the file and remove the malware.
quarantining files
If you are unsure whether a file may contain malware but you also don’t want to risk deleting an important file, you can quarantine the file, which will prevent it from infecting any other files or programs.
deleting files
delete file, so delete malware
anti malware
As new malware is released all the time, anti-malware is only effective if it is kept up to date. Many anti-malware programs will automatically update when the computer is connected to the internet without the user even knowing that this has happened.
what can anti malware have
Anti-malware software can have a real-time checker that scans files before they are used to keep the computer safe, and can also have scheduled scans, which perform checks upon computer files on a regular basis.
firwall where does it sit
A firewall sits between two networks, usually a trusted network and an untrusted network
where r firewalls built in
Firewalls are also built in to network access devices such as that provided by your internet service provider.
firewalls in larger networks
In larger organisations, there may be a dedicated firewall to cope with the higher volume of traffic entering and leaving the network.
examples physical security
security guards
doors with keycard needed to pass
cctv
lock servers and key communication equipment - carefully control access
have policies - e.g dont leave laptop unattended
access rights
Setting appropriate permissions will help to prevent unauthorised access to sensitive or important data.
what else can access rights do
It is also possible to restrict the level of access that a user has; for example, the right to view, edit, or delete a file. Most organisations store their data in databases; database management systems allow restrictions to be specified down to the individual record or even field level.
general rule - access rights
The general rule is that a user should be given the lowest level of access needed to do their job. In this way, there is less opportunity for the accidental loss of data and fewer accounts to investigate if a system is compromised.
if user change or leave job
If a user changes jobs, their access rights should be reviewed and updated if necessary. When a user leaves an organisation, their access rights must be removed.
careful checking of access rights
need to carefully check as if user has higher access right than necessary they may not report it
most basic form authenitcation
UserIDs and passwords
how to create strong password
mix of lower case, upper case, numbers and special characters
make the password long
dont use words and personal data like names
dont use same password for more than 1 account
change passwords regularly
dont write passwords down or share them
use a password manager to create for you strong passwords
extra forms of authentication
two-factor authentication or use biometric security measures. Additional controls can be put in place to make the network more secure; firewalls and MAC address filtering will help control access to the network.
why it important wireless data encrypted
more succesptible to man in middle attack
man in middle attack
A man-in-the middle attack describes a specific situation where a hacker hacks the connection between two people or systems and intercepts the data they are passing to each other.
dos attack
In a denial-of-service attack, a server will be bombarded with requests at a level that it cannot cope with.
anyone trying to access the website will find they wont be able to