Networks and Security Flashcards
firewall
analyses/scans network traffic can block traffic from suspicious hosts/computers/addresses/ports its extremely useful against: hackers transmission of malware
passwords
user has to enter a username and password
can be authenticated by other methods such as biometric
login details matched to a database of users
effective against:
hackers
unauthorised access
mac address filtering
each hardware device has a unique hardware address
a database of allowed hardware/mac addresses is kept/whitelist
to connect to the network a device must have an address on the database/whitelist
what are the types of malware malware
spyware worm ransomware addware trojan virus
social engineering
blagging: Inventing a scenario to engage the victim and gain there trust
phishing: Gaining info using an external link
shouldering: Viewing private info over someone’s shoulder
pharming :A websites traffic redirected to a fake websites
security threats
removable media
Misconfigured access rights
Passwords
Outdated or Patched Software
what is penetration testing
Simulating an attack to see any weakness
What is white box testing
An attacker might have some idea of the inner workings
What is black box testing
An attacker with no connection to the company
What might the attacker have access to in white box testing
Basic files and to the network
PAN,LAN,WAN
personal area network: usually a computer to a household object like a printer, headphones or a phone
large area network: usually one building and is connected in a topology with ethernet cables
wide area network: large geographical location like a continent and is usually wireless