What is a firewall and what is it used for
A piece of software that sits between 2 networks.
It can prevent certain things from entering and leaving
What is static filtering
When a firewall checks packet headers arriving from untrusted networks against a set of rules or packet filters defined by the network administrator
What is packet filtering
When the firewall inspects packets to check which port they’re attempting to access
What is stateful Inspection/ dynamic filtering
When incoming & outgoing traffic is continuously monitored after a connection is established
Done via looking at contents of packet rather than header
What is required of the firewall for stateful inspection to occur
Requires the firewall to maintain a connection table which keeps track of all conversations going on between networks
What does a proxy server do
Sits between the client device and firewall.
Provides anonymity to the client keeping their true IP hidden.
Additional uses of a proxy server
What is symmetric encryption
uses the same key for encryption & decryption
What is asymmetric encryption
Symmetric Vs Asymmetric encryption
What is key exchange
When the communicating devices have to transfer the key between them so they can pass each other messages
What is a digital signature
A form of authentication to guarantee the integrity of the message and authenticate the sender
How is a digital signature created and used
How does the recipient decrypt the message and digital signature
What can a digital signature also include
A timestamp so that a false signature cannot be recreated at a later date
What is a digital certificate
An electronic document that authenticates a message sender or website
What does a digital certificate include
What is the purpose of a digital certificate
What can be considered vulnerabilities in a computer system
What is a virus
What can a virus do
May be designed to:
Spam / steal data / infect other devices on network / corrupt files
What is a worm
Malicious software that can replicate and distribute itself independently.
Done by using network features or email services to spread
What does a worm do
How does a worm waste system resources
Uses up network bandwidth, slows down network significantly
Some cases worms can use all the resources causing a denial-of-service attack