ppe pt2 (nov) Flashcards
What is the network security?
The protection of a network from external and internal threats such as viruses, hacker attacks, data interception and theft, etc.
What is a security threat?
An incident - malicious or unintended - that causes disruption, damage or data loss.
What is a virus?
A piece of malicious code that attaches itself to a legitimate program and is activated when the ‘host’ program is on. It can cause severe damage to data.
What is a hacker?
A seeker and exploiter of security vulnerabilities in code in order to gain unauthorised access to a computer system or network.
What is a ransomware attack?
An attack on a network in which data stored on a server is encrypted, making it unreadable. The victim must pay a ransom to get the data unlocked/back.
What is data integrity?
The reliability and trustworthiness of data.
Define a DOS attack.
A Denial Of Service attack on a network that attempts to prevent legitimate users from access its services.
Define backup & recovery.
The process of making backup copies of data and storing them in a separate location to the live working environment (possibly in the cloud) so that they can be recovered in the event of data loss or damage.
Define ethical hacking.
This is also known as ‘good’ hacking. It is the act of looking for weaknesses in software and systems so that they can be addressed.
What is penetration testing?
‘Pen testing’ is the uncovering of vulnerabilities that could be exploited by a criminal by an ethical hacker (a.k.a. white-hat hackers).
What is social engineering?
An attack that exploits how people behave and respond to certain situations in order to trick them into revealing personal information, usually used by an ethical hacker to test how easily tricked legitimate users of the network can be.
What is the purpose of network security?
The goal o network security is to protect a network and its data from internal and external security threats such as incidents which cause disruption, damage or data loss.
List the three important principles underpinning data security.
- Confidentiality (to protect sensitive data)
- Correctness (incorrect data is useless data)
- Availability (networks can go offline by accident or on purpose. Successful backup & recovery is required)
Explain data integrity.
- Data integrity is the reliability of data
- It can be jeopardised intentionally or by accident
- Data must be checked, secured and protected to maintain data integrity.
What can be used to prevent a DOS attack?
Effective backup and recovery procedures.
Who do ethical hackers typically work for?
They typically work on behalf of an organisation, carrying out simulated hacking attacks (e.g. pen testing) on its network to uncover any vulnerabilities.
Define access control.
Control of who can log into a network and determines what legitimate/authorised users can see and do on the network.
What is authentication?
The process of checking the identity of an individual attempting to gain access to a network.
Define multifactor authentication.
Provides an extra level of security. Users must provide a piece of knowledge, a physical artifact and a physical attribute.
What is the principle of least privilege?
Employees are only given the permissions and administrative rights they need to do their job.
Define file permissions.
Control of the ability to view, change and execute files.
What is physical security?
Controlling access to critical parts of a network using physical method rather than software.
Define malware.
Standing for ‘malicious software’, it is software that has been designed to gain unauthorised access to a computer system in order to cause damage, disrupt its functioning or collect information without the user’s knowledge.
What is encryption?
A technique for keeping data secure by using a key to encode the data. Only someone with the key can decrypt it.
Define firewall.
A network security system which inspects incoming and outgoing data traffic and uses a set of rules to decide which data to allow through from one side to the other.
List 3 criteria with examples that a user must provide to gain access to a network using multifactor authentication.
- A piece of knowledge, e.g. ID, password or pin
- A physical object, e.g. an identity pass
- A physical attribute, e.g. a fingerprint or voice
Give three examples of authentication.
- Username and password
- Algorithms and code
- multifactor authentication
List and explain four types of file permissions.
- Read (users can view the content of a file, but not alter it)
- Write (users can read and amend the content of a file)
- Execute (users can execute the file)
- Delete (users can delete a file)
Give three examples of firewall rules.
- A rule which stops certain protocols from being used to prevent the organisation’s data from being potentially copied to an external sever
- Block data coming/going to/from certain network addresses
- Stop attempts at hacking the internal network’s servers by disallowing data that watches the pattern an attacker would use
Give four suspicious activities that firewalls can block.
- Downloading viruses while browsing online
- Emailing sensitive data to themselves or to someone else outside the organisation
- Visiting harmful or time-wasting websites
- Downloading files from file sharing sites
What is a digital device?
A smartphone, tablet, embedded system, e.g.
Define e-waste.
Any form of discarded electronic equipment, including digital devices.
What is a precious metal?
A very rare, naturally occurring, metallic elements of high economic value.
What is a semiconductor?
Present in every piece of computing technology, it’s a substance (solid, element or compound) used to make computer chips. It can conduct electricity under some conditions but not others, making it a good medium for the control of an electrical current.
Define the replacement cycle.
The period of time between the purchase of assets (e.g. digital devices) and their replacement with equivalent assets.
What is a carbon footprint?
The amount of CO2 an individual or organisation produces as a result of the energy they consume.
Define cloud computing.
The storing of software and data on a remote server accessed through the internet (e.g. microsoft office 365)
Explain why e-waste disposal represents a threat to the environment.
- E-waste can include hazardous materials that can include toxic substances. They will leak out into the ground, contaminating water supplies, infiltrating the food chain and polluting the air.
- Large amounts of e-waste are shipped overseas to developing countries, where it’s dumped into landfill sites or dismantled to extract the minerals.