Social Engineering Flashcards
(pr) What is a layer
A division of network functuality
(pr) Name an advantage of layers
It is self contained- if one layer is removed it does not affect the other layers
(pr) Name a way that affects a network
Physical interference/ number of devices/ bandwidth/ distance data has to travel
(pr) Name a difference between a switch and a router
a switch uses MAC addresses whereas a router uses IP
What does SQL stand for?
Structured Query Language
What is the primary use of SQL?
To interact with databases by retrieving, inserting, updating, and deleting data
What is an SQL injection?
A technique where an attacker inserts malicious SQL code into a website’s input field
How can an SQL injection attack exploit a website?
By manipulating SQL queries to gain unauthorized access to or modify sensitive data
What did the hacker do to test the vulnerability of the search bar?
Entered a string of SQL code into the search box instead of a product name
What is the consequence of not properly validating user input in SQL?
Malicious code can be processed directly by the database, leading to data exposure or manipulation
What should input validation check for to prevent SQL injection?
That the input does not contain malicious SQL statements
What is one way to restrict SQL query execution and prevent SQL injection?
Restricting the types of SQL statements that can be executed
What are user access levels?
Permissions set for different types of users to limit access to sensitive data
What action did the IT team take after discovering the breach?
Launched an investigation into the website’s security
What was the main finding of the IT team’s investigation?
Inadequate input validation allowed SQL injection
What immediate action did the IT team take to fix the issue?
Implemented input validation
Why is error handling important in web applications?
To prevent detailed error messages from being displayed to users, which could aid attackers
What does penetration testing involve?
Simulating real-world cyberattacks to test system security defences
What is a key benefit of conducting regular security audits?
To identify and fix vulnerabilities before they can be exploited
Fill in the blank: SQL injection attacks exploit vulnerabilities in user input validation to manipulate SQL queries and access _______.
sensitive data
True or False: User access levels can help limit the damage a hacker can do.
True
What is a best practice for securing web applications mentioned in the case study?
Regularly updating software and using strong encryption for sensitive data
What is a virus?
A form of malicious software that attaches itself to files or programs, allowing it to spread to other files and programs when the infected file is executed.
Viruses can cause harmful effects such as corrupting or deleting data, slowing down system performance, and disrupting operations.
How do viruses typically enter systems?
Through infected email attachments, downloads from untrusted websites, or physical media like USB sticks.
User execution of infected files activates the virus code.