security and data management Flashcards
What is malware
Malware is a type of program that can replicate itself and cause a computer to malfunction
List different malware
Virus, worms, ransomware, spyware, root kits, Trojan horses, and back doors
List some measures to prevent malware attacks
Installing anti-virus software, backing-up a system in off-site mode, updating operating systems and browsers and avoiding downloads of email attachments from unknown senders
What is phishing
Phishing is a type of attack to obtain security-related information such as passwords by disguising as a trustworthy entity through electronic communication
How are phishing emails filtered
Email service providers filter phishing emails
What is a Denial of Service (DoS) attack
Denial of Service attacks prevent a user from accessing part of a network
In what ways do attackers intercept and steal data
By using hijacking software and pretending to be the destination across the network. Also, by using packet sniffing software
What does packet sniffing software do
Packet sniffing software examines data packets in a certain route and by using a network switch an attacker manages to examine all the data packets at a certain IP address
How can a user defend himself against brute-force attacks
Using long passwords with lowercase, uppercase, numbers and special characters
What are the steps involved in penetration testing
Identifying a vulnerability,
Setting up an attack,
Carrying out the attack,
Testing the ability of the system to recover any lost or corrupted data
List some of the functions of a firewall
Checks whether the incoming and outgoing data meet the set of requirements,
Prevent malware, hackers and DoS attacks
What does a firewall do when any data moving in or out of a network does not meet the requirements of network manager
A warning is issued and the data is blocked
List some areas covered by network policies
Acceptable use policy, archiving, passwords, email, web, remote access, wireless network, servers and incident response plan
What is an incident response plan
In case of a security failure, a plan is established to recover from it, which is called an incident response plan
What are the functions of an archiving policy
It decides the location where the data has to be moved, how it should be moved and how to get it back when required