Topic 9.3.2 Internet Security Flashcards

1
Q

What does a firewall do

A

Sits between the device and the Internet and checks the packets passing through it.
Can be either software or hardware
Can work as a proxy server which can perform packet filtering and stateful inspection
Sender addresss in a packet is the firewalls address so has some degree of anonymity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a proxy server and how does it work

A

A computer system which acts as a gateway between the user and the internet.
Has its own IP address

Client sends a request for webpage to proxy server
Fetches webpage from cache if previously retrieved
If not then it will fetch webpage from target server
Forwards webpage back to the client

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Benefits of a Proxy Server

A

Privacy - hides client’s IP address making it hard to track online activitity

Security - Blocks malicious and harmful websites and protects against cyberattacks like DDos

Performance - Fetches webpage from cache if possible

Content filtering - Adult or Social media sites (useful in schools or businesses)

Bypass geographical restrictions - If a webpage/video is blocked in your country, a proxy will retrieve it by going through different proxies in different locations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How does Packet Filtering work

A

Firewalls use packet filtering to accept or block packets based on the sender’s IP address.
Network Admin can block specific IP addresses (blacklisting)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How does Stateful Inspection work

A

Examines the contents of a packet to decide whether it will allow or block packet.
Some firewalls keep a record of connections in a network, so they can filter out unrelated packets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Explain encryption

A

When information needs to be sent securely over a network or the internet, encryption is used.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Explain Symmetric (Public Key) Encryption

A

Both the sender and receiver will share the same private key.
So this key is used to encrypt AND decrypt data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Explain Key Exchange

A

Before any information is sent, the sender and receiver must participate in a key exchange, so that both have a copy of the key.

IF the key is exchanged over a network it is VERY vulnerable to interception so high security risks

This is used in public key encryption but not in private key encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Explain Asymmetric (Private key) Encryption

A

4 different keys are used.
Each device has a pair of mathematically related keys.
The Private key is kept seret and the Public Key is shared on the internet.
When a message is encrypted with the Public Key, only the corresponding Private Key can decrypt it.
Before a message is sent, it is encrypted using the recipient’s public key. So only the recipient can decrypt the message.

Example in use:
Bob sending Steve a message

BOB encrypts message using STEVE’s PUBLIC key.
STEVE receives message and uses his PRIVATE KEY to decrypt the message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the purpose of a digital signature

A

In Asymmetric Encryption
To verify the sender of the message
To check that the message has not been tampered with during transmission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How do digital signatures work

A

A digest (result) of the message is created by hashing the message with a hash function

The digest is encrypted with the SENDERS PRIVATE key which can be decrypted with the SENDERS PUBLIC key.

The recipient (or anyone) can view the digest but only the recipient will be able to verify if it matches the original message by hashing the original message and seeing if the digest is the same.

In simpler terms, only the sender can create the digest and only the recipient can verify if it matches the message, meaning nobody can tamper with the message and get away with it.

So Asymmetric Encryption using digital signatures is very secure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the purpose of a Digital Certificate.

A

Verifies ownership of a pair of keys used in asymmetric encryption
Checks that a fake pay of keys isn’t being used by an attacker.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How do Digital Certificates work

A

Person generates a pair of keys

Person send a Certificate Signing Request (CSR) to its Certificate Authority (CA) with its public key and personal details

CA verifies the person’s identity

CA issues digital certificate containing
public key
validity period
CA’s digital signature

Person presents certificate to Recipients

Recipients verifies CA signature using CA public key to see if valid and in validity period

Then the two entities can communicate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Define Malware and list examples

A

AKA Malicious Software, refers to any software intentionally designed to harm, exploit or disrupt computer networks and devices.
Worms, Trojans and Viruses are common types of malware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Explain worms and the vulnerabilities they exploit

A

Similar to viruses however they can replicate spread without any need for human interaction.

If they replicate enough without being removed they can:
Cause traffic congestion, shutting down whole networks
Consume system resources (CPU, memory) leading to slower performance
Delete and corrupt files leading to important data loss

They exploit out of date systems with out-of-date virus scanners and fewer security updates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Explain Viruses and the vulnerabilities they exploit

A

Attaches itself to an email and if it is opened then it can copy itself onto all the other files and data in a network

They exploit human errors:
Opening email attachments / links
Downloading off the internet
Putting a random USB stick into the system

17
Q

Explain Trojans and the vulnerabilities they exploit.

A

They are programs which appear useful at first
After it is installed it will create backdoors into your device and network
This allows attackers to access your network, monitor user activities and steal files and data
Does NOT self replicate and spread to other files but humans do that anyways

18
Q

How does improved code quality address malware

A

Since malware often exploits bugs in code, strong code quality can prevent access to your system.

19
Q

How does Monitoring address malware

A

Monitoring tools detect abnormal activity in networks that indicate the presence of malware.
So identifies the malware early before it has a chance to spread and cause damage

20
Q

How does Protection address Malware

A

Antivirus mechanisms to detect, block and remove malicious software.
Firewalls control incoming data and can block any malicious software coming into a system
Train staff to not click on suspicious links or to plug USBs into the server.