U9 - NETWORK SECURITY Flashcards
RISKS TO DATA
HUMAN ERROR
HACKING
VIRUSES
TECHNICAL BREAKDOWNS
INTERCEPTION
OLD DEVICES
PHYSICAL THEFT
INTERCEPTION
Data can be intercepted and altered when sent across a network
PACKET SNIFFING is when packets sent across a network are monitored
DISCARDED COMPONENTS
Old devices can contain data unless FACTORY RESET or SIM REMOVED
HACKING
Gaining unauthorised access to a computer system
White / Grey / Black Hat hacking
THREE WAYS OF BEING SECURE BY DESIGN
Buffer Overflow
Too many permissions
Parameters in functions with no validation
BUFFER OVERFLOW
When a program tries to store more data in a buffer than was intended.
Can occur intentionally in a buffer overflow attack
Can be combatted by BOUNDS TESTING, ensures data enteredis within acceptable limits
TOO MANY PERMISSIONS
Too many users have access to sensitive files. Constantly reviewing permissions
PARAMETERS IN FUNCTIONS WITH NO VALIDATION
Malicious code can be embedded within input bars on webpages.
This occurs when code is entered into functions with no validation.
Vaildation ensures data is as expected.
NAME THE THREE WAYS OF PROTECTING DATA
ACCESS LEVELS
PASSWORDS
ENCRYPTION (XOR)
ACCESS LEVELS
Not all users have access to all data
Only relevant parties have read/write access to files to minimise security risk
PASSWORDS
Passwords should be strong
Containing various different character types
Weak passwords are easier to brute force
No birthdays or names
ENCRYPTION
Data should be SCRAMBLED before being sent across a network
CYPHERTEXT cannot be understood without an ENCRYPTION KEY
XOR encryption - XOR the data with the data key to scramble
TWO WAYS TO IDENTIFY VULNERABILITIES
FOOTPRINTING
PENETRATION TESTING
FOOTPRINTING
Checking what information is available about a company and its servers online
Helps to remove and identify infromation that can aid hackers exploit there target
PENETRATION TESTING
A form of ethical hacking
A system breach is attempted in order to highlight security flaws
This means the vulnerabilties can be removed before a hacker exploits them