Systems Security Finished Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

what is the disadvantage of a network working on the principle of communication and sharing

A

data has the ability to be accessed by unauthorised people

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what are the four types of network attack (+explanation)

A

active - where the hacker tries to modify data on their own remark (DOS)
eavesdropping - where the hacker monitors a network in order to gather information (wiretapping)
external - where someone outside of an organisation tries to hack its network
internal - where someone within an organisation attempts to hack its network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what is a virus

A

programs embedded within other files. they replicate themselves and become parts of other programs. they cause damage by deleting or modifying data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what is a worm

A

programs similar to viruses except that they are not hidden within other files. often spread through emails

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

what is a trojan

A

programs which pretend tp be legitimate but are actually malware. usually spread through email

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

what is spyware

A

programs that monitor user activities and send info back to the hackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what is ransomware

A

programs that attempt to trick the user into paying a ransom by either using scare tactics or encrypting documents

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

what is phishing

A

emails that trick users into giving away personal information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what is a brute force attack

A

where a program is used to find a password by trying all possible combinations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

what is a DOS attack

A

where a computer s used to prevent a server from performing tasks by bombarding it with requests

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

what is data interception and theft

A

stealing data while it is being transmitted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

what is SQL injection

A

some databases use SQL to store their data so when SQL is inputted it can cause errors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

what is the purpose of pen testing

A

determine how resilient a network is against an attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

what is network forensics

A

monitoring the traffic on a network. data packets are copied at regular intervals where it is processed and assessed for malicious activity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

what is a network policy + 5 examples

A

a policy set by the network manager to keep the network safe
users have a secure, hard to guess password
users cannot connect unauthorised equipment
access levels are given
a regular backup procedure is in place
regular pen testing and forensics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

what are user access levels

A

they determine what facilities a user has access to

17
Q

what is encryption

A

the process of disguising data so it cannot be understood

18
Q

what are the purposes of anti-malware software (3)

A

to detect malware that has been installed
to prevent malware from being installed
to remove malware from the system

19
Q

what is the disadvantage of anti-malware software

A

it is reactive so it can only detect known malware

20
Q

what is a firewall

A

a tool that monitors traffic going in and out of a network