1.4 – Network security Flashcards

(26 cards)

1
Q

What is malware?

A

Malicious software designed to disrupt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a computer virus?

A

Malware that attaches to files/programs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a Trojan?

A

.Malware disguised as legitimate software
.Once installed acts as a virus / by example of action e.g. deleting files / allows unauthorised access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is spyware?

A

Malware that secretly collects user activity data like keystrokes or browsing habits and sends it to attackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is social engineering?

A

People are often the weakest link in security
* Using deception to manipulate users
* …to gain personal data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is phishing?

A

. Fake emails sent to person / click on link from fake email
. Person sends personal data / gives away personal data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a brute-force attack?

A

Automated attack trying many username/password combinations until the correct one is found

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a denial of service (DoS) attack?

A

. Multiple requests sent to a server (simultaneously) / server is flooded with requests
. More requests than the server can process / uses all of the bandwidth available
. Server cannot respond / server crashes/denies access / stops access to a network / slows access to a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Pharming?

A

.Software that redirects user to fake website / use of a fake website
. Person enters personal data / gives away personal data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is data interception and theft?

A

Capturing data transmitted over a network without permission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is SQL injection?

A

Malicious SQL code entered into input fields to gain unauthorised access to databases and data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is penetration testing?

A

Attempting to gain unauthorised access to identify vulnerabilities before real attacks occur

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is anti-malware software?

A

Anti-malware
. Scans for / identifies virus/spyware/malware
. Compares data to a database of malware
. Alerts user and requests action such as ..
. Quarantines/deletes virus/spyware/malware
. Stops the download of virus/spyware/malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a firewall?

A

Firewall
. Scans incoming and outgoing traffic
. Compares traffic to a criteria
. Blocks traffic that is unauthorised
. Blocks incoming/outgoing traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are Anti-Viruses?

A

. Scans for / identifies virus/malware
. Compares data to a database of viruses/malware
. Alerts user and requests action such as ..
. Quarantines/deletes virus/spyware
. Stops the download of virus/malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are user access levels?

A

User access levels
. Data can be read/write/ read-write / by example
. Prevents accidental changes
. Limits data users can access

17
Q

Why are passwords important?

A

Passwords/biometrics/authentication
. code/fingerprint etc. has to be correctly entered to gain
access
. strong password / letters, numbers, symbols / fingerprint is
unique to individual …
. harder/impossible for a brute force attack to succeed
. lock after set number of failed attempts

18
Q

What is encryption?

A

Encryption
. Scrambles data
. …using an algorithm
. So if intercepted it cannot be understood
. Key needed to decrypt

19
Q

What is physical security?

A

. Locks
. Key-card entry
. Biometric entry to room
. Passcode entry to room
. Alarms
. Security guards/team
. CCTV

20
Q

Which prevention methods limit malware?

A

Anti-malware software

21
Q

Which prevention methods limit SQL injection

A

Penetration Testing

22
Q

Which prevention methods limit denial of service attacks?

23
Q

Which prevention methods limit insider threats and low-level account damage?

A

User access levels

24
Q

Which prevention methods limit brute-force attacks?

25
Which prevention methods limit data interception or theft?
Encryption
26
Which prevention methods limit physical theft or tampering?
Physical security