security and data management Flashcards
What is malware
Malware is a type of program that can replicate itself and cause a computer to malfunction
List different malware
Virus, worms, ransomware, spyware, root kits, Trojan horses, and back doors
List some measures to prevent malware attacks
Installing anti-virus software, backing-up a system in off-site mode, updating operating systems and browsers and avoiding downloads of email attachments from unknown senders
What is phishing
Phishing is a type of attack to obtain security-related information such as passwords by disguising as a trustworthy entity through electronic communication
How are phishing emails filtered
Email service providers filter phishing emails
What is a Denial of Service (DoS) attack
Denial of Service attacks prevent a user from accessing part of a network
In what ways do attackers intercept and steal data
By using hijacking software and pretending to be the destination across the network. Also, by using packet sniffing software
What does packet sniffing software do
Packet sniffing software examines data packets in a certain route and by using a network switch an attacker manages to examine all the data packets at a certain IP address
How can a user defend himself against brute-force attacks
Using long passwords with lowercase, uppercase, numbers and special characters
What are the steps involved in penetration testing
Identifying a vulnerability,
Setting up an attack,
Carrying out the attack,
Testing the ability of the system to recover any lost or corrupted data
List some of the functions of a firewall
Checks whether the incoming and outgoing data meet the set of requirements,
Prevent malware, hackers and DoS attacks
What does a firewall do when any data moving in or out of a network does not meet the requirements of network manager
A warning is issued and the data is blocked
List some areas covered by network policies
Acceptable use policy, archiving, passwords, email, web, remote access, wireless network, servers and incident response plan
What is an incident response plan
In case of a security failure, a plan is established to recover from it, which is called an incident response plan
What are the functions of an archiving policy
It decides the location where the data has to be moved, how it should be moved and how to get it back when required
What is compression used for
To reduce the size of the files and to reduce the download time of image, audio and video from the Internet
What are the two types of compression
Lossless compression and lossy compression
What is lossless compression
When the file is compressed, the quality of the image remains the same and the file can be reconstructed to its original form
What is lossy compression
When a file is compressed, the unnecessary bits of information are removed permanently
What are the file formats for images
PNG, JPEG and GIF
Which file format is used to store animated graphics
GIF
What is an MPEG
MPEG (Moving Pictures Experts Group) is a standard to encode audio-video files that uses lossy compression technique
What is the file format for DVD movies
MPEG
What attributes of a video file are affected due to compression
Compression reduces the resolution, dimensions and bit rate
What are codecs
Codecs are programs that encode or decode an audio, image or video file
What are compression codecs
Codecs that are aimed at reducing the size of a file without affecting its quality
What is run length encoding
Run length encoding (RLE) is a compression algorithm that converts the consecutive similar values into a code