1.4 Network Security Flashcards

(45 cards)

1
Q

What is meant by malware?

A

Malicious software - an umbrella term for hostile or intrusive executable programs that run on the computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the 5 different types of malware?

A
  • virus
  • worm
  • Trojan
  • spyware
  • ransomware
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the intended impact of a virus?

A
  • Damage / delete / corrupt data
  • Slow down the device
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the intended impact of a worm?

A
  • Damage / delete / corrupt data
  • Slow down the device
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the intended impact of a Trojan?

A

To infect the device with malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the intended impact of spyware?

A

To record keypresses and transmit to a 3rd party , allowing the gain of personal info

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the intended impact of ransomware?

A

To prevent users accessing files in order to extort a payment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How are viruses used?

A
  • They replicate their code in other programs
    • They infect other computers
    • They harm the computer by deleting, corrupting or modifying files
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How are worms used?

A
  • A worm replicates itself in order to spread to other computers
    • They might cause no damage to the attacked computers
    • They slow down networks and computers
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How are trojans used?

A
  • They have a program, game or file which is something the user wants
    • They have negative program code which causes damage, takes control, or provides access to the computer
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How is ransomware used?

A
  • Holds a computer hostage by locking or encrypting access to it
    • If the data is encrypted, meaning it can’t be recovered by an IT specialist
    • Once a ransom is paid to the attacker, they claim access is restored
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is meant by social engineering?

A

the ability to obtain confidential information by asking people for it. It is based on the premise that ‘People are the weakest link in any system / network’

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the three types of social engineering?

A
  • Shoulder Surfing
    • Phishing
    • Pretexting
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the intended impact of social engineering?

A
  • Obtain personal information and profit from it
    • Gain access to personal data / sensitive files
    • Install malware
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is meant by shoulder surfing?

A

Shoulder surfing is the ability to get information or passwords by observing as someone types them in.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is meant by pretexting?

A

Impersonating an IT or Account support representative use this false identity to deceive the victim into providing confidential information or granting access to secure areas.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is meant by phishing?

A

Sending victims a communication that looks genuine, containing a link to fraudulently obtain their personal information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is the purpose of a brute force attack?

A

To gain access to a computer system via a user’s account, to then edit / delete data or install malware or use gained password elsewhere or block access to the account.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

How are brute force attacks orchestrated?

A

Programs which attempt all the possible password combinations

20
Q

How are denial of service attacks conducted?

A

People / software make many requests for data from a web server.

21
Q

What is the purpose of denial of service attacks?

A

The web server cannot respond to all requests and crashes. This could be for financial gain (request payment to stop the attack) or to damage the company’s reputation.

22
Q

How is data interception and theft used?

A

To gain unauthorised access to data being sent to another device

23
Q

What is the purpose of data interception?

A

Data transmission is read by an an unauthorised user / program, meaning personal information can be obtained and profited from + can gain access to personal data / sensitive files + can install malware

24
Q

What is the purpose of an SQL injection?

A

It results in unauthorised access to data / modification of data / deletion of data

25
What 2 methods could be used to limit malware?
Anti-malware software Firewalls
26
What method could be used to limit phishing?
- spam filter
27
What 2 methods would be used for more general social engineering?
User access levels to minimise access to confidential data Firewalls to block known suspicious IP addresses / content
28
What 2 methods could be used to limit a brute force attack?
- set strong passwords - firewalls
29
What method can be used to limit DOS attacks?
- firewall
30
What method can be used to limit data interception and theft?
Encryption
31
What method can be used to limit SQL injections?
- User access levels - restricts what SQL can be executed by a user
32
What does penetration testing ensure?
It makes sure that the system is secure from hackers or other malicious attacks.
33
How does penetration testing limit the attack?
- used to discover weaknesses or vulnerabilities in a system that could be exploited.
34
What does anti-malware software prevent?
- software-based, it prevents malware infecting the system
35
How does anti-malware software limit the attack?
- scans for malware - compares the data to a database of malware - alerts the user and requests actions such as quarantining / deleting the malware or stopping the download of malware
36
What do firewalls prevent?
- software based, they prevent unauthorised access
37
How do firewalls limit the attack?
- scan incoming and outgoing traffic - compare traffic to a set of rules - block traffic that is unauthorised - block incoming/outgoing traffic
38
What do user access levels limit?
- software based, it prevents unauthorised access to data + accidental changes to data
39
How do user access levels limit the attack?
- limits data which users can access - restricts which data can be read / written
40
What do passwords limit?
- software-based, they make it harder for a brute-force attack to succeed (if strong password + locked after set number of failed attempts)
41
How do passwords limit the attack?
- code has to be correctly entered to gain access - use a strong password (letters / symbols / numbers / long) - lock after set number of failed attempts
42
What does encryption prevent?
- any intercepted data is rendered useless
43
How does encryption limit the attack?
- scrambles data using an algorithm, so that if intercepted, it cannot be understood - key needed to decrypt the data
44
What does physical security limit?
- unauthorised access to computer systems and data
45
Give 5 examples of physical security.
- locks - CCTV - alarms - passcode entry to a room - security guards