Network Threats, Attacks and Preventions Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

What two words does malware consist of

A

Malicious
Software

Malicious software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is malware

A

Harmful computer programs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are four types of malware

A

Computer Virus
Ransomware
Trojan Horse
Worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a Computer Virus

A

These infect computers by replicating the code in other programs, along with infecting other computers.

They also deal harm to the computer by deleting, modifying and accessing files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a Worm

A

A virus that replicates itself to cause damage to other computers.

These type of malware don’t deal damage to harmed computers and instead slows them down, and slows down the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a Trojan Horse

A

These type of viruses have programs, games or cracked files that users may commonly want. In reality, it is a negative program code causing damage, take controls or provides unlimited access to the computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is ransomware

A

A malware type which holds a computer hostage by locking or encrypting access to it. Due to encrypted data, no one can access it, not even a cyber security professional is able to unlock the data unless there’s available backups. To be granted access, we may be forced to pay the ransom a high price

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is exploiting

A

Taking advantage of a vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the two types of exploiting technical vulnerabilities

A

Unpatched software
Out of data anti malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is unpatched software

A

If software updates and security updates aren’t installed, software will be vulnerable to malicious activity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is out of data anti malware

A

When software such as antivirus isn’t regularly updated, it is unable to detect the latest viruses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is confidential

A

A set of rules

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is social engineering

A

Ability to obtain confidential information by asking for it.

This is a type of confidence trick that con artists specialise in

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is shoulder surfing

A

Ability to get information or passwords by observing as someone types them in

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is phishing

A

A type of messaging scam done by many con artists.

This type of fraud scheme is when emails, texts or phone calls are sent back to users, pretending to be from a bank or website. Phishing scammers will go to extreme lengths to get what they want.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are six things you need to identify before going through an action sent in an email

A

Greetings: Phishing emails won’t specify your name, just an email address, so not a friendly greeting

The sender’s address: Variation on a genuine request

Forged links: Links may look genuine, but it won’t look like the website given

Personal information requests: Normally, emails never do this. If they ask for this, a con artist has written this

Sense of urgency: Con artists often reply with comments saying that if you don’t do a specific action, a bad thing is going to happen

Poor spelling and grammar: Con artists worry so much about what they get from you, they forget about what they give to you

17
Q

What is a D DoS attack

A

A type of attack where hackers will use or infect a computer, so it sends as many requests as it can to the server, if it has a poor connection and is offline

18
Q

What is an MITM attack

A

Man in the middle attack

In this attack, MITM allows the attacker to intercept communications between the user and the server. Attacks can eavesdrop to find passwords and personal information, so they can add new information to web pages or other communication used

If a hacker connects to an unencrypted WiFi connection, it makes it easier to from an MITM attack

19
Q

What is a Brute Force Attack

A

This is a common type of attack done where hackers will enter every single possible password combination, and will not stop until they get in.

20
Q

What is an SQL attack

A

Structured Query Language Injection

This is a database query language. SQL injection takes advantages of web inject forms for data access to then destroy the data.

SQL commands can be input into web forms instead of expecting “real data”. This is interpreted by vulnerable web applications and ends up causing damage or releasing personal information

21
Q

What is data interception and theft

A

Steals data or intercepts it with an MITM attack

22
Q

What are ways we can use to prevent vulnerabilities and network threats

A

Penetration testing
Physical security
Firewalls
User Access Levels
Anti malware software
Antivirus software
Passwords
Encryption

23
Q

What is encryption

A

A unique way of decoding data so it cannot be read or unencrypted unless unlocked by a key

24
Q

How do we encrypt individual files

A

Files are encrypted individually on a computer and can only be viewed by users who have the password

25
Q

How do we encrypt drives

A

We encrypt ordinary computer drives so that a mandatory password is required for accessing the information.

If we use removable media, special hardware can be purchased, which encrypts the data on the hard disk

26
Q

How do we encrypt transmitted data

A

If a website uses HTTPS, it encrypts the connection to the server.

Your web browser will send its key and form data, encrypting it with the server key.

The sever encrypts the web page you request using your web browser’s key.

27
Q

What is a password

A

A special key that locks the data and can only be accessed if we unlock the key.

28
Q

What is antivirus software/ antimalware software

A

These type of software detect malware, viruses, trojan horses, worms, spyware and ransomware.

29
Q

How does an antivirus/ antimalware software do its job

A

When a virus or malware is detected, it is sent to the antivirus company.

They then verify it is a malware and creates a signature of the virus.

It is then added to the virus database and tell computers to run an update. Viruses can also morph to avoid detection.
This makes it harder to create a signature

30
Q

What is penetration testing

A

The practice of deliberately trying to identify security holes in your own systems. What hackers want is attempting to break in, identify targets of potential attacks, identify possible entry points and report back findings

31
Q

What is a firewall

A

Separates a trusted network from a non trusted network

32
Q

What is the process of a firewall

A

Data is sent around the network in small packets of information.

Packets are checked to know where they are coming from, who it is coming from and who it is going to be sent to.

Packets that don’t match filtering rules are dropped. This is a packet filter

Firewalls are applicable on dedicated hardware or as a software.

In short, the function of a firewall is to detect packets from malicious computers

33
Q

What are the benefits of firewalls

A

Prevents attackers from gaining access to the computer

Blocks certain malicious computers by filtering packets from a certain IP address

Prevents access to certain ports on the network. This is port blocking

Malicious or inappropriate websites are blocked

34
Q

What are drawbacks of firewalls

A

Dedicated hardware firewalls are expensive

Software firewalls slow down a computer

35
Q

What are User Access Levels

A

Access rights which are set on disks, files and folders

36
Q

What are password policies

A

A process that many organisations and computer systems use. This makes sure your chosen password has features like

Minimum character length
At least 1 lowercase letter
At least 1 uppercase letter
At least 1 symbol
At least 1 number
Change password per month

37
Q

What is physical security

A

When software, hardware and networks are protected by real life methods

38
Q

What are examples of physical security methods

A

Electric fences
Barbed wires
Thick walls
Turnstiles and gates
ID cards and signs
Locked doors
Locked cabinets
Security lighting
Numerous security guards
CCTV cameras
Intruder alarms