network seecurity Flashcards

1
Q

pen testing

A

Penetration testing is testing to make sure that the system is secure from hackers or other malicious attacks. It is used to discover weaknesses or vulnerabilities in a system that could be exploited.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

black box pen testing

A

Black-box penetration testing is designed to mimic an external attack on the system. The testing will assume that the attacker is unauthorised and has no knowledge of the system. The tester will use brute force methods and try to exploit well-known software vulnerabilities to get access to the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

white box pen testing

A

White-box penetration testing is designed to mimic an attack from an insider who already has access to the system, and maybe has information about the way the system is configured and operates. This can help safeguard against the actions of someone who is inside the organisation and up to no good.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

When anti-malware detects malware in a computer system, it generally has three options: ??

A

clean
quarantine
delete

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

cleaning files

A

If a file or program has been infected but you still need the file, it is sometimes possible to clean the file and remove the malware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

quarantining files

A

If you are unsure whether a file may contain malware but you also don’t want to risk deleting an important file, you can quarantine the file, which will prevent it from infecting any other files or programs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

deleting files

A

delete file, so delete malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

anti malware

A

As new malware is released all the time, anti-malware is only effective if it is kept up to date. Many anti-malware programs will automatically update when the computer is connected to the internet without the user even knowing that this has happened.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what can anti malware have

A

Anti-malware software can have a real-time checker that scans files before they are used to keep the computer safe, and can also have scheduled scans, which perform checks upon computer files on a regular basis.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

firwall where does it sit

A

A firewall sits between two networks, usually a trusted network and an untrusted network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

where r firewalls built in

A

Firewalls are also built in to network access devices such as that provided by your internet service provider.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

firewalls in larger networks

A

In larger organisations, there may be a dedicated firewall to cope with the higher volume of traffic entering and leaving the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

examples physical security

A

security guards
doors with keycard needed to pass
cctv
lock servers and key communication equipment - carefully control access
have policies - e.g dont leave laptop unattended

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

access rights

A

Setting appropriate permissions will help to prevent unauthorised access to sensitive or important data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

what else can access rights do

A

It is also possible to restrict the level of access that a user has; for example, the right to view, edit, or delete a file. Most organisations store their data in databases; database management systems allow restrictions to be specified down to the individual record or even field level.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

general rule - access rights

A

The general rule is that a user should be given the lowest level of access needed to do their job. In this way, there is less opportunity for the accidental loss of data and fewer accounts to investigate if a system is compromised.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

if user change or leave job

A

If a user changes jobs, their access rights should be reviewed and updated if necessary. When a user leaves an organisation, their access rights must be removed.

18
Q

careful checking of access rights

A

need to carefully check as if user has higher access right than necessary they may not report it

19
Q

most basic form authenitcation

A

UserIDs and passwords

20
Q

how to create strong password

A

mix of lower case, upper case, numbers and special characters
make the password long
dont use words and personal data like names
dont use same password for more than 1 account
change passwords regularly
dont write passwords down or share them
use a password manager to create for you strong passwords

21
Q

extra forms of authentication

A

two-factor authentication or use biometric security measures. Additional controls can be put in place to make the network more secure; firewalls and MAC address filtering will help control access to the network.

22
Q

why it important wireless data encrypted

A

more succesptible to man in middle attack

23
Q

man in middle attack

A

A man-in-the middle attack describes a specific situation where a hacker hacks the connection between two people or systems and intercepts the data they are passing to each other.

24
Q

dos attack

A

In a denial-of-service attack, a server will be bombarded with requests at a level that it cannot cope with.

anyone trying to access the website will find they wont be able to

25
Q

ddos

A

In a distributed denial-of-service (DDoS) attack, the attack comes from a network of distributed computer systems, typically a botnet.

26
Q

what is sql there for

A

SQL stands for Structured Query Language and is a language that is used to form queries to extract or manipulate information in a database.

27
Q

whatcan sql injections do

A

bypass login systems
Extract data such as lists of credit card details or email addresses
Delete data
Update data
Insert data
Execute commands that can download and install malware

28
Q

how to avoid sql injec

A

SQL injection can be avoided by good coding practices, including validating inputs to ensure that they do not contain any unexpected characters. A “parameterised statement” makes sure that the query string and the parameter values are passed to the database separately, which allows them to be treated safely.

29
Q

brute force

A

This type of attack uses a computer program to generate all combinations of characters until it finds the combination that matches the password.

30
Q

dictionary attack

A

A dictionary attack is a brute force attack that uses a list of passwords (the dictionary) to check if the password that is being cracked matches a password in the list.

31
Q

impact of network secuirty failure

A

If personal data is accessed or stolen, the organisation will be investigated and fined.
If commercial information is stolen, it may be given or sold to competitors and the organisation may lose a competitive advantage.
The greatest impact is reputational impact. Customers and stakeholders may move to other services and use them after hearing of the security failure.

32
Q

phishing

A

Phishing is an attack in which the victim receives a message disguised to look like it has come from a reputable source .
The message will include a link that, when clicked, will either trick the user into revealing personal data or initiate the installation of malware on the victim’s device.

33
Q

spear fishing

A

more personalised
targetted to 1 person

34
Q

indicators of phsing message

A

Any unexpected message with a request for information
obvious errors
sus hyperlinks
messages not addressing you by name

35
Q

pharming

A

The term pharming refers to a user being sent to a fake website that the user believes is the real one. Once there, the user might be tricked into submitting personal information such as entering their username and password into a fake login window.

A common way in which this is done without the need for a high level of technical expertise is when a cybercriminal registers a URL that is very similar to a real one.

36
Q

DNS poisoning

A

DNS poisoning involves hacking a DNS. When the victim enters a correct web address of the site they wish to visit into their browser, they visit a website controlled by the attacker, rather than the legitimate website.

37
Q

what indicates pharming attack

A

Spelling errors or incorrect logos
Broken or missing links
A notification from your browser warning you that the webpage is insecure
The lock symbol that your browser uses to confirm that a webpage is secure is missing

38
Q

blagging

A

Blagging is an attack in which the perpetrator invents a scenario in order to convince the victim to give them data or money.

This attack often requires the attacker to maintain a conversation with the victim until they are persuaded to give up whatever the attacker asked for.

39
Q

what indicates blagging

A

Suspicious code in email (“Dear <name?>”)
Unusual use of language (“an excitable business opportunity”)
Spelling mistakes (“relese”)
An attempt to start a conversation (“I look forward to hearing from you”)

40
Q

shouldering

A

Shouldering (also known as shoulder surfing) is an attack designed to steal a victim’s password or other personal information.

It involves the attacker watching the victim, for example, over their shoulder, while they provide personal information

41
Q

why people shoulder surf?

A

to get:

Someone’s PIN at a cash machine
The code to access a secure room
Someone’s password whilst they type it on the keyboard

42
Q
A