Section 5 - Networks and Section 6 - Cyber Security Flashcards

1
Q

What is a computer network?

A

Computer network:

— A group of computers connected together

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the three main types of network?

A

PAN (personal area network):
— Within the range of a person and have a range of 10m e.g. Bluetooth

LAN (local area network):

  • – Connects devices close to each other
  • – They cover small geographical areas e.g school or home
  • – They are owned and managed by one person or organisation

WAN (wide area network):

  • – Connectes devices over a much wider geograhical area (possibly several locations)
  • – The internet is the biggest example of a WAN
  • – Usually managed by more than one person collectively
  • – Internet is made of several LANs connected
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Compare wireless and wired networks.

A

Wired:

  • – Generally, data transfer is faster
  • – Less likely to suffer from interference
  • – Less susceptible to hackers
  • – Expensive to install or reconfigure
  • – Might not be able to connect to the network from other locations

Wireless:

  • – Can access the network from multiple locations
  • – Nodes can easily be added without interruption to the network
  • – Signals have a limited range
  • – Signals can be blocked by walls for example
  • – Signals with roughly the same frequency causes interference
  • – Each node has a limited bandwidth so more connections = slower bandwidth for each device
  • – More prone to hacking
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

When would fibre optic cables and copper cables be appropriate to use?

A

Fibre optic cabling is made from glass. Appropriate when wanting to send signals across long distances

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the purposes and uses of Ethernet and WIFI?

A

Ethernet:

  • – A family of related protocols
  • – Ethernet cables are twisted copper cables

Wifi:

  • – A family of related protocols
  • – Wifi is a trademark, the generic term is WLAN (wireless local area network)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the purposes and uses of TCP, UDP and IP?

A

TCP (Transmission Control Protocol):

  • – Operates at the transport layer
  • – Deals with the connection between devices
  • – When going outbound, it receives data from the application layer and splits it into packets
  • – When going inbound, it receives packets from the network layer and reassembles them to the original data
  • – It provides error checking and connection

IP (Internet layer):

  • – Operates at the network layer
  • – Protocol addresses packets with the source and destination IP address
  • – When sending back to the transport layer, the protocol removes the IP addresses as they are no longer needed

UDP (User Datagram Protocol):

  • – Alternative to TCP, operates at the transport layer
  • – TCP sets up a two-way connection whereas UDP sends the data one way
  • – Suitable when error checking and connection is not required
  • – Faster due to less delay but less reliable than TCP
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the purposes and uses of HTTP, HTTPS and FTP?

A

HTTP/S (Hypertext Transfer Protocol/Secure):

  • – Operates at the application layer
  • – Used to access a webpage from web server
  • – HTTPS provides a more encrypted version of a webpage as data is secured

FTP (File Transfer Protocol):

  • – Operates at the application layer
  • – Used with file uploads and downloads
  • – Transfers data and programs
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the purposes and uses of the email protocols?

A

SMTP (Simple Mail Transfer Protocol):

  • – Operates at the application layer
  • – Handles outbound emails from the client to the internet via the mail server

IMAP (Internet Mail Access Protocol):

  • – Operates at the application layer
  • – Handles inbound email from the internet to the client via a mail server
  • – Keeps mail server and client in sync
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Describe the four layer TCP/IP model

A

Application layer:
— this is where the network applications, such as web browsers or email programs operate

Transport layer:
— this layer sets up the communication between the two hosts and they agree on settings such as ‘language’ and size of packets

Internet/Network layer:
— addresses and packages data for transmission, routes the packets across the network

Link layer:
— this is where the network hardware such as the NIC (network interface card) is located. OS device drivers also sit here

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Define cyber security.

A

Cyber security:

— The processes designed to protect networks from attack or unauthorised access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is malware?

A

Malware stands for malicious software. It is an umbrella term that refers to variety of forms of intrusive or hostile software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Describe four different forms of malware.

A

Viruses:
— implanted inside normal programs themselves so that when the host program is executed then so does the virus

Trojan:
— disguises itself as something else to trick people into thinking of it as desirable software

Adware:
— displays unwanted adverts to generate revenue as people will be intrigued to press on the advert (sometimes these adverts refuse to close unless pressed on)

Spyware:
— collects data by tracking activity on the computer and then sending this information back to the attack instigator e.g. recording passwords entered

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How can malware be protected against?

A

Protection:

— Using up to date anti-malware software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Explain other cyber security threats apart from malware.

A
  • – Unpatched software - security holes have been fixed in a newer version of the software but the user themselves need to install this newer version
  • – Outdated software - constant updates are required to ensure security breaches are fixed properly
  • – Misconfigured access rights - when a person has permissions they shouldn’t have
  • – Weak and default passwords - makes it easy for people to gain access to things they shouldn’t be able to access
  • – Removable media - easily transfers malicious code onto other devices
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is social engineering?

A

Social engineering:

— Manipulating people into giving up their confidential information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Explain four forms of social engineering.

A

Blagging:
— Inventing a scenario to engage a victim and gain their trust. This encourages them to give away confidential information or even send money.

Phishing:
— Gaining confidential information through an external link e.g. emails or links in emails. Phishing emails are often disguised as emails from reliable sources e.g. school or Netflix

Pharming:
— Cyber attack where website’s traffic is redirected to a fake website

Shouldering:
— Viewing personal information over a person’s shoulder e.g. PIN numbers or passwords

17
Q

How is encryption used to prevent cyber security threats?

A

Encryption: this is making data secret so that it is not understood by third party viewers and only authorised viewers can decrypt and read the data

  • – Data is written in plaintext text so humans can read it
  • – Encrypted into ciphertext using an algorithm
  • – Message is sent
  • – Message is received
  • – Message is decrypted back into plaintext using the encryption key
18
Q

How do firewalls prevent cyber security attacks?

A

Firewalls:

  • – Monitor network traffic and filter packets under certain rules
  • – Can block packets from random regions
  • – Either software or hardware
  • – They filter based on the addresses or the contents in the packets
19
Q

How does MAC address filtering help prevent against cyber security attacks?

A

MAC address filtering:

  • – MAC stands for Media Access Control
  • – MAC addresses are unique worldwide and can’t be changed
  • – MAC address filtering is blocking (or allowing) devices trying to access a network based on their MAC address
  • – Relatively weak because switching devices can easily bypass the block and it is possible to fake MAC addresses by eavesdropping if it is not encrypted
20
Q

How do biometric measures help prevent cyber security attacks?

A

Biometric measures:

  • – Used as identifications and access control
  • –e.g fingerprint, eye, facial and voice recognition
21
Q

How does CAPTCHA help prevent cyber security attacks?

A

CAPTCHA:

  • – Stands for Computer Automated Public Turing test to tell Computers and Humans Apart
  • – Determines whether a user is a human or robot
  • – Prevents spam
  • – Used in websites
22
Q

How do these following measures prevent against cyber security attacks:

  • – Passwords systems
  • – Email confirmations
  • – Automatic software updates
A

Passwords:
— Ensure passwords are strong to prevent unauthorised users from gaining access. Weak or default passwords are easily guessable.

Email confirmations:
— Confirms identity to ensure that it is the right person trying to gain access to something which prevents unauthorised users from gaining access.

Automatic software updates:
— This links to unpatched/outdated software. Automatic updates ensure that any security breaches are fixed without a user going through the stress of having to constantly check for updates.

23
Q

Define penetration testing and go into detail on the two types.

A

Penetration testing:
— The process of attempting to gain access to resources without knowledge of usernames, passwords and other normal means of access.

Black box testing:
— Simulating an external hacking or cyber warfare attack where the attacker has no knowledge of any credentials for the target system.

White box testing:
— Simulating a malicious insider who has knowledge of and possibly basic credentials for the target system.