Preventing vulnerabilities * Flashcards
1
Q
List the 8 techniques for preventing vulnerabilities
A
- penetration testing
- network forensics
- network policies
- user access levels
- secure passwords
- encryption
- anti-malware software
- firewalls
2
Q
What is penetration testing? (2 points)
A
- determine how resilient a network is against an attack
- probe network for potential weaknesses and attempt to exploit them
3
Q
What is network forensics?
A
- monitoring the traffic on a network
- at regular intervals transmitted data packets are copied
- these are stored for later analysis
- information gathered can help identify invasive traffic (from hackers)
4
Q
What are network policies? (10 points)
A
policies that ensure:
- users have secure, hard-to-guess passwords
- users change their passwords on a regular basis
- users cannot connect unauthorised equipment to a network
- levels of access are given
- regular backup procedure is in place
- disaster recovery procedure in place
- regular penetration testing
- regular maintenance
- maintaining high level of security - firewalls, anti-virus software
- preventing physical access to servers
5
Q
What are user access levels?
A
determine the facilities a user has access to
6
Q
What is encryption?
A
the process of disguising data so that it cant be understood
7
Q
What are the three purposes of anti-malware
A
- to detect malware
- to prevent malware from being installed
- to remove malware from the system
8
Q
What are firewalls?
A
a tool that monitors traffic going into and out of a computer or a network and either allows traffic to pass or blocks it, based on the firewall policy