1.4 - Network Security Flashcards

(28 cards)

1
Q

How does Data interception and theft work ?

A

When sensitive information travelling on a network is intercepted using monitoring hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How does Brute - force work ?

A

When automated software is used to try millions of potential passwords until one is correct

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How does denial of service (Dos) work ?

A

When a hacker prevents users from accessing a network or website by flooding it with useless traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How does SQL injection work ?

A

When SQL code is typed into input boxes on a website. If the site has weak input validation, the hacker can gain access to the websites database - information about customers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is malware ?

A

Software designed to damage or disrupt a device or network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the 5 types of malware ?

A

Spyware
Ransomware
Viruses
Worms
Trojans

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How does spyware work ?

A

It monitors user actions and sends this information back to the hacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How does ransomware work ?

A

It encrypts files and the user has to pay for the decryption key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How do viruses work ?

A

They are attached to files and either run or replicate when the file is opened by the user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How do worms work ?

A

They are like viruses but self replicate which makes them spread quickly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How do trojans work ?

A

They are malware disguised as legitimate software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is social engineering ?

A

Gaining access to networks or sensitive information by using people as a systems weak point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the 2 types of social engineering ?

A

Telephone
Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How does telephone (social engineering work) ?

A

When a person is called by someone pretending to be a company and is persuaded to disclose confidential information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How does phishing (social engineering work) ?

A

When criminals send emails pretending to be a company. The emails contain links to fake websites that ask users to update personal information which the criminals can steal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are passwords used for ?

A

They prevent unauthorised users from accessing a network

17
Q

What attack do password usually nullify ?

A

Brute force attacks

18
Q

What in encryption ?

A

When data is translated into cypher text that needs a specific decryption key to understand and translate back to plain text

19
Q

What 2 things does encryption mainly protect against and how ?

A

Data interception - Secures data sent over network making it harder to intercept
SQL injection - Secures data stored on network

20
Q

What do user access levels control ?

A

Who has access to sensitive data
Who can edit the sensitive data
Who can change user access levels

21
Q

What 2 things does user access levels mainly protect against and how ?

A

Social engineering / malware - limits the number of people who have access to sensitive data

22
Q

What does anti malware software do ?

A

Prevents malware from damaging a network and devices on it

23
Q

What do anti virus programs do ?

A

They isolate and destroy computer viruses

24
Q

What do firewalls do ?

A

They examine all data entering and leaving a network by blocking unauthorised access and unwanted data.

25
What do firewalls help defend against ?
Most types of attacks
26
What is physical security ?
Protects physical parts of a network from damage
27
What are 2 types of physical security ?
Locks and passcodes Surveillance equipment
28
What is penetration testing ?
When organisations hire specialists to stimulate attacks. They identify and report weaknesses which the organisation can improve