Section 10 Chapter 58 - Internet Security Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

Firewall

A

A security checkpoint that prevents unauthorised access between two networks, often a local network and the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The uses firewalls (3)

A
  • Packet filtering
  • Stateful inspection
  • Proxy server
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Packet filtering

A

Controls network access by rejecting certain packets based on the contents of their header. It can look at the

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Stateful inspection

A

Controls network access by inspecting the payload of packets. It can apply temporary rules based on the passage of previous packets in a conversation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Proxy server

A

Intercepts all packets entering and leaving a network and therefore hides the true network addresses from the recipient. It can also store a cache of recently viewed webpages to increase browsing speed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Encryption

A

The process of scrambling data so that it can only be read with the correct key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The type of key for symmetric encryption

A

private

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Symmetric encryption

A

The same key is used to encrypt and decrypt the data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Type of key for asymmetric encryption

A

public and private

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Asymmetric encryption

A

There are two keys: public and private. The public key is used to encrypt and the private key is used to decrypt. Anyone can encrypt a message with the public key but only you can read it using your private key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How digital signatures work

A

A checksum is appended to the end of some data. This is then encrypted using the senders private key. When received, the checksum can be obtained by decryption through the use of the senders public key and then can be checked against the data. The signature may contain the time and date

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Digital certificate

A

Issued by the Certificate Authorities and verifies that the public key for a digital signature is formally registered.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Worm

A

Standalone malware that can replicate itself and spread

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Virus

A

Malware that requires a host to spread and replicate itself

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Trojan

A

Malware that disguises itself as a legitimate program. Cannot replicate or spread

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How to protect against malware (2)

A
  • Improved code quality

- Monitoring and protection

17
Q

Code quality

A

Malware often takes advantage of buffer overflows so avoid dat stuff

18
Q

Monitoring and protection

A

Regular scans for viruses