4.2 Network Security Flashcards

(15 cards)

1
Q

network security

A

protecting a network and its data from internal and external threates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

security threat

A

an incident - malicious or unintended - that causes disruption, damage, or data loss

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

data integrity

A

reliability and trustworthiness of data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

denial of service

A

an attack on a network that attempts to prevent legitimate users from accessing its servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

3 principles underpinning data security (i.e. importance of network security)

A

confidentiality - organisation’s networks are likely to hold sensitive data about people/products/performance
- if this data got damaged/stolen it could not run efficiently
so only the people authorised to do so should be able to access confidential data

correctness - incorrect data is useless
access to data should be strictly controlled so only those who need it can access it
- eg: error on health records or manufacturing control system

availability - a network is useless if data cannot be accessed when it is needed
- in case of a flood/fire, or a DoS attack
effective backup and recovery procedures are needed to plan for such eventualities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

ethical hacking

A

‘good’ hacking - looking for weaknesses in software and systems so that they can be addressed
- ethical hackers sometimes called white hat hackers

the ethical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

penetration testing

A

also called pen testing

a simulated hacking attack on a network to uncover any vulnerabilities that could be exploited by a criminal

once complete, the ethical hacker produces a report listing the vulnerabilities discovered and advising on methods to address them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

access control (+ 3 mechanisms)

A

controlling who can log in to a network and determining what authorised users can see and do on the network

using authentication, principle of least privilege, file permissions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

authentication (and multifactor authentication)

A

authentication is the process of checking the identity of an individual attempting to gain access to a network
- done by validating a username and password against details stored on a central server

multifactor authentication requires the user provide 3 things to provide an extra level of security:
- a piece of knowledge (ID/password/PIN)
- a physical artefact (id pass, swipe card, electronic key fob)
- physical attribute (fingerprint, voice)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

principle of least privilege

A

giving employees only the permissions and administrative rights they need to do their jobs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

physical security

A

ensuring only authorised individuals can enter critical areas
- includes protecting against theft of equipment and might involve installing a burglar alarm, security tagging, and physically locking down equipment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

encryption

A

keeping data secure by using a key to encode the data
- only someone in possession of the key is able to change the data back to its original form (decrpyt it)
- even if a hacker gains access to encrypted data, they will not be able to read it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

firewall (def)

A

a network security system that acts as a barrier between an organisation’s internal network and the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

how does a firewall work

A

inspects incoming and outgoing data traffic and uses a set of rules to decide what data to allow through from one side to the other

rules could be:
- stop certain protocols (eg FTP) from being used to prevent the organisation’s data being potentially copied to an external server
- block data coming from / going to certain network addresses
- disallowing data that matches the pattern an attacker would use

also flag up suspicious activity taking place on the internal network and prevent insiders from downloading viruses / emailing themselves sensitive data / visiting harmful websites / downloading files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

hardware and software firewalls

A

individual computers are likely to have a software firewall installed
hardware firewalls have much more flexibility in terms of the rules that can be applied and allow faster throughput of data

for maximum protection, an organisation should have a hardware firewall to protect its network, and should install a software firewall on each of its network devices
- it is especially important that any laptops taken offsite have a software firewall (because they will not be protected by the network firewall)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly