Unit 4 - Network Security Flashcards
What is malware
Malware is any software intenionally designed to cause damage to a computer,server,client or computer network
What is the 7 types of malware ?
Trojans,spyware,adware,rookits,ransomware,worms,keyloggers
What is the malware virus ?
They replicate their code in other programs
They infect other computers
Theu harm the computer by delecting corrupting or modifying files
What malware is a worm
A worm replicates its self in order to spread to other computer.
They slow down networks and computers
What is a trojan horse ?
They have a program that the user wants. However they also have a negative code that can then cause damage,take control,provides access to the computer
What is ransomware ?
Holds a computer hostage by locking or encrypting access to it.
If the data is encrypted not even a cyber security professional can recover it. Once the ransom is paid to the attacker access is restored
What is a brute force attack
A hacker will try every combination or password until the correct answer is found
What does SQL stand for?
Structured query language
What is an sql injection ?
Takes advantage of web inputs forms to access or deystroy data
What is social engineering ?
Deception to gain personal information
What is denial of service attacks ?
Flooding a server or network with pointless requests so that is fails or slow down
What is data interpretation and theft ?
Stealing data or intercepting it with a man-in-the-middle attack
Name 4 common preventation methods
penetration testing • anti-malware software – including anti-virus software • firewalls • user access levels • passwords • encryption • physical security
What is penetration testing ?
Is the practice of deliberately trying to find security holes in your own system
What is anti malware software ?
Anti-malware software will detect malware such as viruses, worms, trojans, and spyware
What is encryption ?
Encryption is a way of securing data so that it cannot be read without the encryption key
What are firewalls
is a network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules
What are user access levels
They are set by an admin. On how much a user can edit or see of a disk,folder and indivdual files
What are Password policys?
chosen password has features like • Minimum length of characters • Include at least one lowercase letter • Include at least one uppercase letter • Include at least one symbol • Change password every month
What is physical security
hardware, software and networks are protected by physical methods
Name 4 examples of physical security ?
- CCTV
- Intruder alarms
- Locks on doors or cabinets
- Fences, walls, barbed wire
- Security guards
- ID cards and signs
- Turnstiles and gates
What are operating systems
Manage computer hardware, users and the resources used by the software.
Example multitasking, user managment, file managment
What are graphical user interfaces
Pointers, icons, menu, drag and drop, windows
What are the different types of user interfaces ?
Graphical user interfaces, command line interface, menu -driven interface
What are interrupts
Are signals sent to the cpu by external devices to indicate an event that needs immidediate attention
What is the difference between hardware and software interrupts
Hardware - generate by hardware devises. Printer out of paper
Software - are generate by programs. A wrong password will cause an error message
What are the forms of network attacks?
Passive Active Insider Brute force Denial of service
What is a passive attack
monitoring data across network and intercepting any sensitive information they find (through the use of network monitoring hardware and software
What is an active attack
attacking a network with malware or other planned attacks
What is a brute force attack
trying to gain access by using many password combinations