Section Two and a Bit: Network Security Threats Flashcards

1
Q

What is a passive attack?

A

Where someone monitors data travelling on a network and intercepts any sensitive information they find.
They use network-monitoring hardware and software such as packet sniffers.
Passive attacks are hard to detect as the hacker is quietly listening

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How do you defend against passive attacks?

A

Data encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is an active attack?

A

When someone attacks a network using malware or other planned attacks.
They are more easily detected than passive attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How do you defend against active attacks?

A

A firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is an insider attack?

A

When someone within an organisation exploits their network access to steal information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a brute force attack?

A
  • A type of active attack used to gain information by cracking passwords through trial and error.
  • They use automated software to produce hundreds of likely passwords combinations
  • Hackers may try lots of passwords against one username or vice versa
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How do you defend against brute force attacks?

A

Simple measures like locking accounts after a certain number of failed attempts and using strong passwords will reduce the risk of a brute force attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a Denial of Service (DoS) attack?

A

Where a hacker tries to stop users from accessing a part of a network or website
Most DoS attacks involve flooding the network with useless traffic, making the network extremely slow or completely inaccessible

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is malware?

A

Malicious Software

Installed on someone’s device without their knowledge or consent that can harm their device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are some of the typical actions of malware?

A
  • Deleting or modifying files
  • Scareware
  • Locking files
  • Spyware
  • Rootkits
  • Opening backdoors
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is scareware?

A

E.g. It tells the user that their computer is infected with lots of viruses to scare them into following malicious links or paying for problems to be fixed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What happens when a hacker locks files?

A

Ransomware encrypts all the files on a computer. The user receives a message demanding a large sum of money to be paid in exchange for a decryption key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is spyware?

A

It secretly monitors user actions, e.g. key presses, and sends info to the hacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are rootkits?

A

Rootkits alter permissions, giving malware and hackers administrator-level access to devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What does it mean to open backdoors?

A

Making holes in someone’s security which can be used for future attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How can malware access a device?

A

Viruses
Worms
Trojans

17
Q

Viruses

A

Attach to certain files, e.g. .exe files and autorun scripts. Users spread them by copying infected files and activate them by opening infected files

18
Q

Worms

A

Like viruses but they self-replicate without any user help, meaning they can spread very quickly. They exploit weaknesses in network security

19
Q

Trojans

A

Malware disguised as legitimate software. Unlike viruses and worms, Trojans don’t replicate themselves - users install them not realising they have a hidden purpose.

20
Q

What is a network policy?

A

A set of rules and procedures the organisation will follow to ensure their network is protected against attacks and unauthorised access

21
Q

A good network policy will…

A
  • Regularly test the network to find and fix security weaknesses and investigate any problems
  • Use passwords to prevent unauthorised people from accessing the network
  • Enforce user access levels to limit the number of people with access to sensitive information
  • Install anti-malware and firewall software to prevent and destroy malicious software attacks.
  • Encrypt sensitive data
22
Q

What is penetration testing?

A

When organisations employ specialists to simulate potential attacks on their network
Pentesting is used to identify possible weaknesses in a network’s security by trying to exploit them. The results of the pentest are then reported back

23
Q

What are network forensics?

A
  • Network forensics are investigations undertaken to find the cause of attacks on a network. To conduct network forensics, an organisation needs to have a system of capturing data packets as they enter their network.
  • After the network is attacked, these packets can be analysed to discover how the network was attacked and decide how to prevent future attacks
24
Q

Passwords

A
  • Passwords help prevent unauthorised users accessing the network
  • Passwords should be strong - they should be many characters long, use a combination of letters, numbers and symbols - and be changed regularly
25
Q

What are user access levels?

A
  • They control which parts of the network different groups of users can access
  • User access levels help limit the number of people with access to important data, so help prevent insider attacks on the network
26
Q

An example of using UALs

A

Business managers are likely to have a higher access level allowing them to access more sensitive data, like pay information.
They may also have to write access to files that others can only read and the ability to change employees’ access levels.

27
Q

Anti-malware software

A

Designed to find and stop malware from damaging a network and the devices on it. There are lots of different types of anti-malware software, including antivirus programs which isolate and destroy computer viruses.
Companies use firewalls to block unauthorised access. Firewalls examine all data entering and leaving the network and block any potential threats

28
Q

Encryption

A
  • When data is translated into a code which only someone with the correct key can access, meaning unauthorised users cannot read it
  • Encrypted text = cipher text
  • Unencrypted text = plain text
  • Encryption is essential for sending data over a network securely
29
Q

What is social engineering?

A

A way of gaining sensitive information or illegal access to networks by influencing people, usually the employees of large companies

30
Q

What is phishing?

A

A type of social engineering where a criminal sends emails or texts to people claiming to be from a well-known business.
The email often contains links to spoof versions of the companies website.
They then request that the user updates their personal information, which the criminals then gain access to in order to use on their genuine account.

31
Q

How can a user be defended against phishing?

A

Email programs, browsers and firewalls have anti-phishing features that will reduce the number of phishing emails received.

32
Q

What is SQL?

A

Structured Query Language

One of the main coding languages used to access information in databases

33
Q

What is a SQL injection?

A
  • Pieces of SQL typed into a website’s input box which then reveal sensitive information.
  • If a website does not have secure input validation, then someone can enter a piece of SQL code which allows them to access other people’s account information as well as their own.