U9 - NETWORK SECURITY Flashcards

1
Q

RISKS TO DATA

A

HUMAN ERROR
HACKING
VIRUSES
TECHNICAL BREAKDOWNS
INTERCEPTION
OLD DEVICES
PHYSICAL THEFT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

INTERCEPTION

A

Data can be intercepted and altered when sent across a network
PACKET SNIFFING is when packets sent across a network are monitored

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

DISCARDED COMPONENTS

A

Old devices can contain data unless FACTORY RESET or SIM REMOVED

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

HACKING

A

Gaining unauthorised access to a computer system
White / Grey / Black Hat hacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

THREE WAYS OF BEING SECURE BY DESIGN

A

Buffer Overflow
Too many permissions
Parameters in functions with no validation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

BUFFER OVERFLOW

A

When a program tries to store more data in a buffer than was intended.
Can occur intentionally in a buffer overflow attack
Can be combatted by BOUNDS TESTING, ensures data enteredis within acceptable limits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

TOO MANY PERMISSIONS

A

Too many users have access to sensitive files. Constantly reviewing permissions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

PARAMETERS IN FUNCTIONS WITH NO VALIDATION

A

Malicious code can be embedded within input bars on webpages.
This occurs when code is entered into functions with no validation.
Vaildation ensures data is as expected.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

NAME THE THREE WAYS OF PROTECTING DATA

A

ACCESS LEVELS
PASSWORDS
ENCRYPTION (XOR)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

ACCESS LEVELS

A

Not all users have access to all data
Only relevant parties have read/write access to files to minimise security risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

PASSWORDS

A

Passwords should be strong
Containing various different character types
Weak passwords are easier to brute force
No birthdays or names

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

ENCRYPTION

A

Data should be SCRAMBLED before being sent across a network
CYPHERTEXT cannot be understood without an ENCRYPTION KEY
XOR encryption - XOR the data with the data key to scramble

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

TWO WAYS TO IDENTIFY VULNERABILITIES

A

FOOTPRINTING
PENETRATION TESTING

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

FOOTPRINTING

A

Checking what information is available about a company and its servers online
Helps to remove and identify infromation that can aid hackers exploit there target

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

PENETRATION TESTING

A

A form of ethical hacking
A system breach is attempted in order to highlight security flaws
This means the vulnerabilties can be removed before a hacker exploits them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

NAME 5 FORMS OF CYBER ATTACK

A

SQL INJECTION
DoS ATTACK
BRUTE FORCE ATTACK
IP SPOOFING
SOCIAL ENGINEERING

17
Q

SQL INJECTION

A

Structured Query Language
Malicious code is injected into search bars/ forms to compromise the security of information

18
Q

DoS ATTACK

A

Denial of Service Attack
Flooding the network with meaningless requests in order to make it crash

19
Q

BRUTE FORCE ATTACK

A

Working through all the possible combinations in order to crack a password

20
Q

IP SPOOFING

A

Changing the IP of a legitimate website so that if a user types in the address they are taken to a fake webpage where the hacker can steal sensitive information.

21
Q

SOCIAL ENGINEERING

A

Phishing is a form of social engineering
Using people as the vulnerability
Manipulating people into giving away sensitive information

22
Q

NAME 4 TYPES OF MALWARE

A

VIRUSES
WORMS
TROJANS
KEYLOGGERS & SPYWARE

23
Q

VIRUSES

A

Programs that can REPLICATE themselves abd spread across a system
Must attach itself to a HOST FILE

24
Q

WORMS

A

SELF-REPLICATING programs that identify vulnerabilities in the OS
Enable REMOTE CONTROL of the infected computer

25
Q

SPYWARE & KEYLOGGERS

A

Spyware is accidentally downloaded and then COLLECTS DATA without the user’s knowledge
Keyloggers record key strokes to log passwords and account numbers

26
Q

TROJANS

A

Programs that appear legitimate but provide a backdoor for hackers to steal data from

27
Q

NAME 4 WAYS OF KEEPING A NETWORK SECURE

A

TWO-FACTOR AUTHENTICATION
UP TO DATE SOFTWARE
ANTIVIRUS
FIREWALLS

28
Q

TWO-FACTOR AUTHENTICATION

A

An extra securtiy measure
The user is required to identify themselves twice
i.e. a code sent to an email address

29
Q

UP TO DATE SOFTWARE

A

Having the latest OS means the best security
Updates remove vulnerabilities

30
Q

FIREWALLS

A

A firewall is software that monitors outgoing and inbound network traffic. Data packets are analysed for malicious code before being allowed onto the network

31
Q

ANTIVIRUS SOFTWARE

A

Scans data on the network flagging potential threats
Anti-virus software automatically scans and deletes malicious software
Antivirus needs to be routinely updated against new security threats

32
Q

COOKIES

A

Small pieces of data given by a website and stored on the user’s device
Used to identify a user and give personalised webpages, targeted ads and automatic login
Used to track visitors to a webpage
Tracking cookies can reveal search history privacy breach

33
Q

ACCEPTABLE USE POLICY

A

Terms which an employee must adhere to when on a company computer system
i.e. no obscene material, no gambling, malicious activity

34
Q

DISASTER RECOVERY POLICY

A

Policies set out in the event of a catastrophic data loss
Details where backups can be found, how employees should work in the meantime, steps to recover data