network seecurity Flashcards
pen testing
Penetration testing is testing to make sure that the system is secure from hackers or other malicious attacks. It is used to discover weaknesses or vulnerabilities in a system that could be exploited.
black box pen testing
Black-box penetration testing is designed to mimic an external attack on the system. The testing will assume that the attacker is unauthorised and has no knowledge of the system. The tester will use brute force methods and try to exploit well-known software vulnerabilities to get access to the system.
white box pen testing
White-box penetration testing is designed to mimic an attack from an insider who already has access to the system, and maybe has information about the way the system is configured and operates. This can help safeguard against the actions of someone who is inside the organisation and up to no good.
When anti-malware detects malware in a computer system, it generally has three options: ??
clean
quarantine
delete
cleaning files
If a file or program has been infected but you still need the file, it is sometimes possible to clean the file and remove the malware.
quarantining files
If you are unsure whether a file may contain malware but you also don’t want to risk deleting an important file, you can quarantine the file, which will prevent it from infecting any other files or programs.
deleting files
delete file, so delete malware
anti malware
As new malware is released all the time, anti-malware is only effective if it is kept up to date. Many anti-malware programs will automatically update when the computer is connected to the internet without the user even knowing that this has happened.
what can anti malware have
Anti-malware software can have a real-time checker that scans files before they are used to keep the computer safe, and can also have scheduled scans, which perform checks upon computer files on a regular basis.
firwall where does it sit
A firewall sits between two networks, usually a trusted network and an untrusted network
where r firewalls built in
Firewalls are also built in to network access devices such as that provided by your internet service provider.
firewalls in larger networks
In larger organisations, there may be a dedicated firewall to cope with the higher volume of traffic entering and leaving the network.
examples physical security
security guards
doors with keycard needed to pass
cctv
lock servers and key communication equipment - carefully control access
have policies - e.g dont leave laptop unattended
access rights
Setting appropriate permissions will help to prevent unauthorised access to sensitive or important data.
what else can access rights do
It is also possible to restrict the level of access that a user has; for example, the right to view, edit, or delete a file. Most organisations store their data in databases; database management systems allow restrictions to be specified down to the individual record or even field level.
general rule - access rights
The general rule is that a user should be given the lowest level of access needed to do their job. In this way, there is less opportunity for the accidental loss of data and fewer accounts to investigate if a system is compromised.