Network Threats Flashcards

1
Q

What is malware short for?

A

Malicious software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is malware a general term for?

A

For any hostile or intrusive software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the 9 types of malware?

A
Computer Virus
Trojan
Spyware
Adware
Pharming
Click fraud
Ransomware
Rootkits
Scareware
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What threats are labelled as ‘social attacks’?

A

When hackers try and trick, fool, bribe, or threaten people online

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What do all social attacks have in common?

A

They attack people rather than hardware or software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Give 3 examples of social attacks

A

Bribing a user into allowing an attacker access to a system
Putting a thumb-drive full of malware somewhere a user might pick it up, and labelling it so that they would want to open it on their system
Phoning up a user at work and convincing them to break policy and give them the information they want directly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does ‘phishing’ involve?

A

Sending out e-mails, instant messages, or phone calls pretending to be someone in authority. The attacker then uses that fake authority to convince users to voluntarily give up sensitive information such as passwords, bank account details

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the most common method of phishing?

A

By email

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a ‘brute force’ attack?

A

When a computer program is written to go through every possible combination of letters (and / or symbols) until the right one comes up to guess a user password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How can ‘brute force’ attacks be stopped?

A

By limiting the number of attempts a user can have at logging in within a certain time period

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a ‘dictionary’ attack?

A

Where all the words of the most popular languages are used before brute force is tried to guess a password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is denial of service?

A

A method of preventing legitimate users from connecting to a server. Web sites can be blocked with this method

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How does denial of service work?

A

It works by flooding the targeted server with millions of bogus requests. There are so many requests that all the server memory and CPU cycles are used up and the server then crashes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What does a denial of service attack often involve?

A

Hundreds or thousands of computers which have been infected with botnet malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What happens in a ‘Distributed Denial of Service’ attack?

A

Each machine sends a stream of bogus requests. The legitimate owner of the infected computers are unaware that their machine is being used in this way

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is Data interception and theft?

A

It is a form of eavesdropping as users are unaware that their data is being extracted

17
Q

How does a data interception attack work?

A

When data packets are intercepted. An extra server or router is placed in the network so that packets coming from the target computer are re-directed, copied, and sent on. The data within each packet, such as passwords or confidential information, is then extracted from the copied packets

18
Q

What is an effective defence against data interception?

A

To encrypt each data packet. The eavesdropper would then have the extra task of decrypting the information

19
Q

What is an SQL injection?

A

Is the deliberate addition of malicious SQL code into a web form in order to view \ modify \ delete database records or to gain unauthorised access

20
Q

What do attackers do in an SQL injection?

A

The attacker tries to insert extra SQL commands, for the database, into the input boxes, hoping that these commands will be carried out by the server

21
Q

What is a good way of protecting against SQL injection?

A

Get the server to validate the information properly before the SQL request is formed. For example, the user name and password may only be a certain length and to not allow invalid characters

22
Q

What is the defence against SQL injection which involves adding a non-alphanumeric characters, for example & becomes “\&”?

A

Escape character. This forces the input to be treated as characters only rather than commands

23
Q

What are the risks with having a poor network policy?

A

Without precautions, guidance and training, there is a risk that some users, albeit unwittingly, will introduce threats to the network

24
Q

What should be in a network policy to do with passwords?

A

Passwords must be hard to guess

25
Q

What should be in a network policy to do with access rights?

A

People will only be given access to certain parts of the network to carry out their work

26
Q

What should be in a network policy to do with sharing passwords?

A

No one is allowed to share their username password

27
Q

What should be in a network policy to do with screensavers?

A

All computers will have password protected screen savers

28
Q

What should be in a network policy to do with confidential emails and files?

A

They should all be encrypted

29
Q

Why does a good network policy need to be in place?

A

To reduce security risk