Topic 4.2 - Network Security Flashcards
What is asymmetric encryption
encrypts and decrypts data using two separate keys - public key and private key - you use the other persons public key to encrypt it and they sue their private key to decrypt it
What is symmetric encryption
algorithms encrypt and decrypt a message using the same key - both sides must know the exact same key
what are the 5 types of malware
virus, worms, trojans, ransomware, keyloggers/spyware
how does ransomware operate
Ransomware downloads malicious software that encrypts the user’s file and the user must pay to decrypt the data
why is data on networks encrypted
To prevent unauthorised access so that data remains confidential by making it unintelligible because it is scrambled
how can companies prevent breaches from their own employees (4 methods)
Background checks, Access control, Physical security, User policies
how do software and hardware firewalls work together to enhance data security
Hardware firewalls blocks malware before it can enter your network and software firewalls inspects the network traffic that makes it through the firewall to ensure there isn’t any malware
What is a firewall
network security acting as a barrier between the internet and organisation’s network
What are the ways to prevent unauthorised access (5 ways)
Encryption, access control, authentication, firewall, physical security
What is Encryption
uses a key to encode the data so only the person with the correct key can decipher it back
What are the factors in a multi-factor authentication and give examples
piece of information (password, pin)
physical object (ID card)
physical attribute (fingerprint)
What is penetration testing
a hacker employed by the company to look for weaknesses and vulnerabilities to be fixed