T4 - Preventing vulnerabilities: Flashcards
Penetration testing
‘Pen’ testing is the practice of deliberately trying to find security holes in your own systems
Penetration testing goal
Goal:
identify the targets of potential attacks
identify possible entry points
attempt to break in
report back the findings
Anti-malware software detects:
will detect malware such as viruses, worms, trojans, and spyware
what happens when viruses are detected by anti-malware software
-When a virus is detected
-it is sent to the anti-virus company
-They verify it is malware
- create a signature (cure) of the virus
-They then add it to their virus database
- tell computers to run an update
Encryption:
way of securing data so that it cannot be read without the encryption key
computer drives can be encrypted so that a password is needed to access the information
Cannot be accessed even if removed
Firewalls:
Separate a trusted network from an untrusted network
sent around a network in small packets of information
Checked to see where they are coming from and going to
Packet filtering is -
When packets that don’t match filtering rules are dropped
Encryption - web pages
Your web browser sends its key and form data, encrypting it with the server’s key
The server encrypts the web page you request using your web browser’s key
Files can be encrypted individually on a computer using a password
Firewall can…
be built into hardware and detect packets from malicious computers
Firewall features:
- Prevents attackers from gaining access to computers on a network
- Can block certain malicious computers by filtering packets
Malicious or inappropriate websites can be blocked
User access levels:
Access rights may be set on disks, folders and even individual files
Password policy:
checked as they are created to make sure that the conform to the parameters given in a required policy
Firewalls = port blocking
Port blocking - Can prevent access to certain ports on the network.
Firewalls cons
Dedicated hardware firewalls are expensive
Software firewalls will slow down a computer
Physical security:
where hardware, software and networks are protected by physical methods