Unit 4 - Network security & system software Flashcards

1
Q

What is malware?

Network threats

A
  • comes from 2 words: malicious software
  • executable programs that run on a computer
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are different types of malware?

Network threats

A
  • Viruses
  • Worms
  • Trojans
  • Ransomware
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How do viruses work?

Network threats

A

Computer viruses infect computers by:
- replicating their code in other programs
- infecting other computers
- harming the computer by deleting,
corrupting or modifying files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How do worms work?

Network threats

A
  • replicates itself in order
    to spread to other computers
  • may cause no damage to the attacked computers
  • slow down networks
    and computers
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How do computer trojans work?

Network threats

A
  • a program, game or cracked file that user wants
  • they have a negative programs code which causes damage, takes control, or provides access to the computer
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How does ransomware work?

Network threats

A

Software which:
- holds a computer hostage by locking or encrypting access to it
- if the data is encrypted, not even a cyber security professional will be able to recover the data unless backups are available.
- the access will only be restored if the ransom is paid.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are 2 ways hackers can exploit technical vunerabilities?

Network threats

A
  • unpatched software
  • out-of-date anti-malware
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Why are unpatched software vulnerable?

Network threats

A

if software updates and security updates are not installed then the software will be vulnerable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Why are out-of-date anti-malware vulnerable?

Network threats

A

if software, such as antivirus software, isn’t regularly updated then it won’t be able to detect the latest viruses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is social engineering?

Network threats

A

Social engineering is the ability to obtain confidential information by asking for it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is sholder surfing?

Network threats

A

Shoulder surfing is the ability to get information or passwords by observing as someone types them in.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Phising?

Network threats

A

Phishing is a type of social engineering technique, emails, texts or phone calls are sent to users commonly pretending to be from a bank or website.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How can phising be spotted?

Network threats

A
  • Greeting: greeting is not personalised
  • The sender’s address is often a variation on a genuine address
  • Forged link: The link looks genuine, but it may not link to the website given.
  • Poor spelling and grammar
  • Request for personal information: Genuine organisations never do this
  • Sense of urgency: Criminals try to persuade you that something bad will happen if you don’t act fast
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a denial of service (DoS) attack?

Network threats

A

In a denial of service attack, a hacker will use or infect a computer so that:
- it sends as many requests to the server as it can (known as a flood)
- the server can’t respond fast enough so slows down or goes offline

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a distributed denial of service attack (DDoS)?

Network threats

A

many computers are used to send the requests

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a man-in-the-middle attack (MITM)?

Network threats

A

allows the attacker to intercept communications between the user and server and:
- eavesdrop to find passwords and personal information
- add different information to a web page or other communication such as email

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What are some threats to digital devices?

Network threats

A
  • losing mobile phone can lead to loss of all data in it
  • malware can allow malicious users to acces device
  • some apps are malicious and lead to fraudelent charges
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Methods to protect mobile phone:

Network threats

A
  • use strong password
  • encrypt data
  • dont follow links in sus emails
  • dont install apps without researching them
  • delete all info on phone before discarding
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is a brute force attack?

Network threats

A

In a brute force attack, a hacker will try every combination of password until the correct password is found.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is a SQL injection and how does it work?

Network threats

A

uses web forms to add SQL instructions to a query that cause data loss or the revealing of personal information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is penetration testing?

Preventing vulnerabilities

A

The practice of deliberately trying to find security holes in your own systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

How does penetration testing work?

Preventing vulnerabilities

A

testing to:
- identify the targets of potential attacks
- identify possible entry points
- attempt to break in
- report back the findings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is an anti malware software?

Preventing vulnerabilities

A

Anti-malware software will detect malware such as viruses, worms, trojans, and spyware

24
Q

How does anti malware software work?

Preventing vulnerabilities

A
  • When a virus or new malware is detected it is sent to the anti-virus company.
  • malware is verifies, then a signiture of malware is crated
  • signiture is added to virus database and tell computers to run an update
25
Q

What is encryption?

Preventing vulnerabilities

A

Encryption is a way of securing data so that it cannot be read without the encryption key.

26
Q

How does encryption work?

Preventing vulnerabilities

A

Passwords stored by websites are almost always stored in an encrypted form, if a hacker obtains the data in the password database, they won’t be able to easily read the passwords

27
Q

How is transmitted data encrypted?

Preventing vulnerabilities

A

Websites using HTTPS encrypt the connection to the server: your web browser sends its key and form data, encrypting it with the server’s key, the server encrypts the web page you request using your web browser’s key.

28
Q

How can files be encrypted?

Preventing vulnerabilities

A

Files can be encrypted individually on a computer using a password, they can then only be viewed by people who have the password. Software such as zip files allow encryption to be applied.

29
Q

How can drives be encrypted?

Preventing vulnerabilities

A

Ordinary computer drives can be encrypted so that a password is needed to access the information, preventing hackers from understanding the contents if it is installed in a different computer.

30
Q

What is a firewall?

Preventing vulnerabilities

A

Prevents attackers from gaining access to computers on a network

31
Q

How does a firewall work?

Preventing vulnerabilities

A
  • block certain malicious computers by filtering packets from a certain IP address
  • prevent access to certain ports on the network (port blocking)
  • malicious or inappropriate websites can be blocked
32
Q

What are user access levels?

Preventing vulnerabilities

A

Users will be given different levels of access to a system. They may have access to certain databases, programs or files.

33
Q

What are password policies?

Preventing vulnerabilities

A

Password policies make sure that passwords are made hard to guess and would require specific features.

34
Q

What is physical security?

Preventing vulnerabilities

A

Physical security is where hardware, software and networks are protected by physical methods.

35
Q

What are examples of physical securities?

Preventing vulnerabilities

A
  • CCTV
  • Intruder alarms
  • Locks on doors or cabinets
  • Fences, walls, barbed wire
  • Security guards
  • ID cards and signs
  • Turnstiles and gates
36
Q

What does an operating system do?

Operating system

A

Operating systems manage computer hardware, users and the resources used by software

37
Q

What does operating system manage?

Operating system

A
  • The user interface
  • Memory management
  • Multitasking
  • Peripheral management and drivers
  • User management
  • File management
38
Q

What are user interfaces and the 3 types?

Operating system

A

User interfaces provide a method for users to interact with a computer.
Command line, Menu drive and graphical.

39
Q

What is a graphical user interface?

Operating system

A

a digital interface in which a user interacts with graphical components such as icons, buttons, and menus.

40
Q

What is a command line interface?

Operating system

A

Text commands are entered into the interface, requires very little processing and can save on the need for an expensive graphics card.

41
Q

What are menu driven interfaces?

Operating system

A

often used by devices that have a dedicated function including, MP3 players, ATM machines, Self service checkouts

42
Q

What is memory management?

Operating system

A

To run a program, the computer must copy the program from storage into main memory. The OS keeps a record of where each program and its data are located and makes sure not to overwrite existing programs and data.

43
Q

What is multitasking?

Operating system

A

Multi-tasking is where an operating system manages many tasks happening at the same time. The operating system decides which process will next run on the CPU and for how long

44
Q

What are interrupts?

Operating system

A

Interrupts are signals sent to the CPU by external devices to indicate an event that needs immediate attention. They tell the CPU to suspend its current activities and execute appropriate instructions.

45
Q

What is peripheral management?

Operating system

A

The operating system must manage getting inputs from and sending outputs to peripheral devices.

46
Q

What is a device driver?

Operating system

A

A device driver is a program that controls peripheral devices, each device communicates with the OS via its own driver

47
Q

What is disk management?

Operating system

A

The hard disk in a computer is a storage peripheral. The OS:
- manages where on the disk files are written
- keeps track of where they are so they can be retrieved
- makes sure no file overwrites another file

48
Q

What are file management features?

Operating system

A

Features available on for files:
- Naming files
- Allocating files to folders
- Moving files
- Saving files
- Copying files
- Deleting files

49
Q

What is user management?

Operating system

A

The OS is resposible for user logins and passwords, it will store all users and their passwords in a fie or database.

50
Q

What are access rights?

Operating system

A
  • If a computer is used by more than one person, each user should be able to see only their own files
  • Users and system administrators have different levels of access rights
  • Some users may be allowed to read files but not edit them
51
Q

What is a utility software?

Utility software

A

Utility programs perform extra functionality and housekeeping tasks that keep computers running efficiently.

52
Q

What are the 4 main components of utility software?

A
  • Encryption software
  • Defragmentation software
  • Data compression
  • Disk clean-up tools, disk formatters, anti-virus software
53
Q

What is encryption software?

A

Encryption software is used to encode text so that it cannot be understood without knowing the key to decode it.

54
Q

What is disk fragmentation?

Utility software

A

When you save a large file it may not fit on the disk in consecutive memory locations. In order to read the file, the drive head will need to move to more locations.This makes it far slower to access files and programs.

55
Q

What is disk defragmentation?

Utility software

A

Defragmenting the hard disk reorganises files so they are stored together. Read times are far faster
Free space is also in one place so new files do not need to be fragmented

56
Q

What is data compression software?

Utility software

A

Utilities such as WinZip enable users to compress and decompress files or folders.

57
Q

What are benefits of data compression?

Utility software

A
  • reduces the amount of storage space needed on a disk
  • If sending the files, it reduces the amount of data that is sent
  • allow attachments to be sent via email that would otherwise be too large
  • More data can be stored on backup media