T4 - Preventing vulnerabilities: Flashcards

1
Q

Penetration testing

A

‘Pen’ testing is the practice of deliberately trying to find security holes in your own systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Penetration testing goal

A

Goal:
identify the targets of potential attacks
identify possible entry points
attempt to break in
report back the findings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Anti-malware software detects:

A

will detect malware such as viruses, worms, trojans, and spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what happens when viruses are detected by anti-malware software

A

-When a virus is detected
-it is sent to the anti-virus company
-They verify it is malware
- create a signature (cure) of the virus
-They then add it to their virus database
- tell computers to run an update

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Encryption:

A

way of securing data so that it cannot be read without the encryption key
computer drives can be encrypted so that a password is needed to access the information
Cannot be accessed even if removed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Firewalls:

A

Separate a trusted network from an untrusted network
sent around a network in small packets of information
Checked to see where they are coming from and going to

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Packet filtering is -

A

When packets that don’t match filtering rules are dropped

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Encryption - web pages

A

Your web browser sends its key and form data, encrypting it with the server’s key
The server encrypts the web page you request using your web browser’s key
Files can be encrypted individually on a computer using a password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Firewall can…

A

be built into hardware and detect packets from malicious computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Firewall features:

A
  • Prevents attackers from gaining access to computers on a network
  • Can block certain malicious computers by filtering packets
    Malicious or inappropriate websites can be blocked
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

User access levels:

A

Access rights may be set on disks, folders and even individual files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Password policy:

A

checked as they are created to make sure that the conform to the parameters given in a required policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Firewalls = port blocking

A

Port blocking - Can prevent access to certain ports on the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Firewalls cons

A

Dedicated hardware firewalls are expensive
Software firewalls will slow down a computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Physical security:

A

where hardware, software and networks are protected by physical methods

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Physical security eg

A

security lighting
CCTV
Intruder alarms
Locks on doors or cabinets
Fences, walls, barbed wire
Security guards
ID cards and signs

17
Q

Why do new signatures need to made for new viruses

A

Viruses can morph to avoid detection. This makes it harder to create a signature