System Security #2: Detection and Prevention Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

What are Network Policies?

A

Network Policies are organisational rules for network access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a Failover?

A

This means that if a piece of key hardware (like a server or router) stops working, a secondary back up device will take over the functionality to prevent network downtime.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Archiving?

A

A network that keeps archives means that they keep a store of data currently not in use, but may be used at a later data.
E.G previous user information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Penetration Testing?

A

Simulating an attack to find weaknesses
Attempting to gain access to resources without knowing normal means of access
E.G Like a username and password

Includes a review reporting the findings, and then countermeasures are implemented, based on any vulnerabilities found.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is White Box testing?

A

A white-box pen test is to simulate an inside attack, where the attacker may have some knowledge of the system and basic credentials

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is Black Box testing?

A

A black-box pen test is to simulate an outside attack, i.e. hacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is network forensics?

A

The capture, recording and analysis of traffic to discover attacks

It can be done using sniffing software (and lost of storage), and by using web server logs which show when data was accessed.

“Catch it as you can”
All packets stored, and analysed
- Lots of storage

“Stop, look and listen”
All packets quickly analysed, and only some information is stored
- Fast processor, less storage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Other security measures

A

Email confirmations: That confirm a user’s identity
i.e. that they have access to the email accounts they state is theirs

Passwords: Memorable information, fingerprints etc

Automatic software update:
(Especially for anti-malware software). General updates will include patches for known vulnerabilities, and anti-malware will update its database with new signs of malware

User Access Levels:
Are assigned to give people different permissions
E.G basic users and administrators, meaning there are greater limits to who can perform what operations on the system/network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly