ppe pt2 (nov) Flashcards
What is the network security?
The protection of a network from external and internal threats such as viruses, hacker attacks, data interception and theft, etc.
What is a security threat?
An incident - malicious or unintended - that causes disruption, damage or data loss.
What is a virus?
A piece of malicious code that attaches itself to a legitimate program and is activated when the ‘host’ program is on. It can cause severe damage to data.
What is a hacker?
A seeker and exploiter of security vulnerabilities in code in order to gain unauthorised access to a computer system or network.
What is a ransomware attack?
An attack on a network in which data stored on a server is encrypted, making it unreadable. The victim must pay a ransom to get the data unlocked/back.
What is data integrity?
The reliability and trustworthiness of data.
Define a DOS attack.
A Denial Of Service attack on a network that attempts to prevent legitimate users from access its services.
Define backup & recovery.
The process of making backup copies of data and storing them in a separate location to the live working environment (possibly in the cloud) so that they can be recovered in the event of data loss or damage.
Define ethical hacking.
This is also known as ‘good’ hacking. It is the act of looking for weaknesses in software and systems so that they can be addressed.
What is penetration testing?
‘Pen testing’ is the uncovering of vulnerabilities that could be exploited by a criminal by an ethical hacker (a.k.a. white-hat hackers).
What is social engineering?
An attack that exploits how people behave and respond to certain situations in order to trick them into revealing personal information, usually used by an ethical hacker to test how easily tricked legitimate users of the network can be.
What is the purpose of network security?
The goal o network security is to protect a network and its data from internal and external security threats such as incidents which cause disruption, damage or data loss.
List the three important principles underpinning data security.
- Confidentiality (to protect sensitive data)
- Correctness (incorrect data is useless data)
- Availability (networks can go offline by accident or on purpose. Successful backup & recovery is required)
Explain data integrity.
- Data integrity is the reliability of data
- It can be jeopardised intentionally or by accident
- Data must be checked, secured and protected to maintain data integrity.
What can be used to prevent a DOS attack?
Effective backup and recovery procedures.
Who do ethical hackers typically work for?
They typically work on behalf of an organisation, carrying out simulated hacking attacks (e.g. pen testing) on its network to uncover any vulnerabilities.
Define access control.
Control of who can log into a network and determines what legitimate/authorised users can see and do on the network.
What is authentication?
The process of checking the identity of an individual attempting to gain access to a network.
Define multifactor authentication.
Provides an extra level of security. Users must provide a piece of knowledge, a physical artifact and a physical attribute.
What is the principle of least privilege?
Employees are only given the permissions and administrative rights they need to do their job.
Define file permissions.
Control of the ability to view, change and execute files.
What is physical security?
Controlling access to critical parts of a network using physical method rather than software.
Define malware.
Standing for ‘malicious software’, it is software that has been designed to gain unauthorised access to a computer system in order to cause damage, disrupt its functioning or collect information without the user’s knowledge.
What is encryption?
A technique for keeping data secure by using a key to encode the data. Only someone with the key can decrypt it.