Security Flashcards

1
Q

What is Network security?

A
  • network security is the activities designed to protect a network and its data from threats such as viruses, hack attackers, denial of service attacks, data interception and theft, and equipment failure.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the 3 areas that network security protect?

A
  • confidentiality.
  • correctness.
  • availability.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is DoS?

A
  • denial of service is an attack on a network that attempts to prevent legitimate users from accessing its service.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the 3 reasons why security is important?

A
  • required for the running of the organization.
  • private and confidential.
  • financially valuable.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the 3 ways to protect data confidentiality?

A
  • ensuring only authorized users can access the parts of a network and its resources that they have a reason to require.
  • stopping misuse.
  • encrypting data.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is authentication and validation?

A

authentication is the process of checking the identity of a user of a computer system or network.
authentication is done by validating a username and password against details stored on a central server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is two- factor authentication?

A
  • a security check where users have to type in the code from a portable hardware device called a “secure token” or from and SMS message sent to their mobile phone.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is access control?

A

this decides which users have access to which data, and what they are allowed to do with it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the two options that access control decides whether a particular file?

A
  • read-only access.
  • read and write access.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is read-only access?

A

this is where the user can open the file and read its contents, but not modify the contents or delete the file.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is read and write access?

A

read and write access(modify access), where the user can read the file, alter the contents and then saves the changes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a firewall?

A
  • firewall is a network security system that monitors and controls data that is moving from one network to another.( eg:- between the internet and local internal network)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is hacking?

A

the act of gaining unauthorized access to a computer system and the data it contains.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is throughput?

A
  • allow more data to pass through them.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is physical security?

A
  • controlling access to critical parts of a network using physical methods (such as locked doors) rather than software.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is malware?

A

short for ‘malicious software’. it is used as a generic term for any kind of software that is designed to disrupt the use of a computer system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What are the 4 advantages of cloud storage relating to avaliability?

A
  • cloud storage provider is responsible for the hardware your data is stored on.
  • the cloud storage provider can normally make extra storage available.
  • having data stored off-site, means that it is protected from loss due to fire, theft of computers/ servers, electrical failure so on.
  • data can be backed-up
18
Q

What are the disadvantages of cloud storage related to security disadvantages?(5)

A
  • there might be problems for the third-party storage provider.
  • could be hacked as it is saved online.
  • cloud storage users have to assume that the cloud storage servers are trustworthy.
  • need a high-speed internet connection to access data.
19
Q

what is USB?

A

it is a universal serial bus socket found on most modern computer systems.

20
Q

What is a NAS storage system?

A
  • NAS is a hardware device that is connected to a network to provide file storage for any device connected to that network.
21
Q

What is a cyber attack?

A
  • any kind of malicious attack on a network-connected device.
22
Q

What is social engineering?

A
  • any kind of attack on a computer system or network that takes advantage of how people behave and respond to certain situations.
23
Q

What is phishing?

A
  • directing internet users to a fake website that looks like a real one, to obtain personal information such as passwords, account numbers, etc.
24
Q

What are the two ways cyber attacks can classified to?

A
  • social engineering.
  • technical weaknesses.
25
Q

Reasons for cyber attacks? (4)

A
  • gain access to data contained within the system.
  • delete or modify information.
  • make the system unavailable for use.
  • physically damage a device connected to the network (usually by overreading safety limits)
26
Q

What are the 3 common forms of social engineering?

A
  • phishing
  • shoulder surfing.
  • pharming.
27
Q

What are the 5 ways to prevent pharming?

A
  • check that the http address of site is one you intended to visit.
  • check that there is a secure connection if you have to enter sensitive information.
  • check the site’s security certificate.
  • install the latest security updates.
  • install antivirus software.
28
Q

What are the 3 common examples where cyber-attacks rely on technical weaknesses?

A
  • unpatched software.
  • USB device.
  • eavesdropping.
29
Q

What is unpatched software?

A
  • it is software that hasn’t had the latest security updates applied to it, making it vulnerable to attack.
30
Q

what is eavesdropping?

A
  • eavesdropping means intercepting data being sent to/from another computer system. (simple means reading data without actually copying or stealing it.)
31
Q

What is code vulnerability?

A

a computer program (code) written in such a way that it creates a security issue that may be taken advantage of to gain access to the computer system or data.

32
Q

What are the 5 questions software and system designers will need to consider ?

A
  • what kind of authentication.
  • Does warning need to be issued?
  • Stored data need to be encrypted.
  • threats the software might face.
33
Q

What is modular testing?

A

testing each block of code as it is completed to ensure the code works as expected.

34
Q

What is audit trail?

A

a record of activities that have taken place on a computer system. This record is generated automatically and will record what has happened and who or what made the change

35
Q

What are the 3 ways of identifying vulnerabilities?

A
  • penetration testing.
  • commercial analysis tools.
    -reviews of network and user policies.
36
Q

What are the other 3 methods to reduce the chance of cyber attacks succeeding?

A
  • use of an audit trail.
  • use of secure operating system.
  • Provide effective network security.
37
Q

What are the 2 scans commercial analysis tools take?

A
  • external scan.
  • internal scan.
38
Q

What is external scan?

A
  • External scan shows vulnerabilities that a hacker could exploit from outside the company’s network.
39
Q

What is internal scan?

A
  • Internal scan can be used to scan the network from within to show up issues that could be exploited by a rogue employee, or hacker who might get physical access to the networks.
40
Q

What should all networks have in written policies?

A
  • network policy.
  • user policy.
41
Q

What should be documented in network policy?

A
  • who is authorized to carry out various activities on the network.
  • how and when patches to software should be applied.
  • access control.
  • password requirements.
  • how security is set up and maintained on the network
42
Q

What should be documented in User policy?

A
  • the use of the network is allowed or not allowed?
  • what will happen to the user if they do something unacceptable.
  • how to report faults, problems, and security issues.
  • security information, such as good practice when choosing and using passwords.