System Security Flashcards
Name five methods of attacking a network
Brute force attack Denial of service attack (DoS) Data interception SQL injection Zero-Day attack
What is a brute force attack?
Automated software is used to try millions of passwords and usernames to find one that works.
What is a denial of service attack?
Slow down a server greatly or cause the server to crash by overloading the server with requests.
What is data interception?
By intercepting data packets moving through a network, they can be decoded in order to obtain sensitive information.
What is SQL injection?
Entering SQL code into a user input field, such as a search bar, when the request is sent to the server, it will run the SQL code, allowing you to gain access to the data in the database.
What is a zero day attack?
The day a major security fault is found in software, usually just after it has been released. This day is known as zero-day. As hackers rush to exploit the fault and developers rush to fix it.
List 4 ways of improving a networks security
Every user having a strong password
Restricting access rights to parts of the network to users who do not need them
Encrypting important data
Firewall
What is the acceptable use policy for a network?
A set of conditions and rules that a network user mjst agree to in order to use the network
Give some examples of things that could be on an acceptable use policy
Must not install software
Must not access data for which the user has not been authorised to access.
Must not download files from the internet
What is a network’s backup policy?
The policy to follow when a network is being backed up.
List some things that could be included in a backup policy
Who is responsible for the backup When the backup is made Where the backup is kept How often backups will be done How long the backups will be kept
What is a network’s disaster recovery policy?
The set of procedures that the owner of the network will follow to restore normal network operations after a natural or man-made disaster.
What is penetration testing?
Testing a network to see if it is vulnerable to attacks. The owner of the network may hire someone externally who has no knowledge of the network to do the testing.