Network Security Flashcards

(17 cards)

1
Q

What is malware

A

Type of harmful program that seeks to damage or gain unauthorised access to your computer system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How does a virus work

A

A virus can replicate itself from system to system by attaching itself to infected files

A virus is only activated when opened by a human

Once activates a virus can change data or corrupt a system so that it stops working

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How does a WORM work?

A

A work can replicate itself from system to system by finding weaknesses in software

A worm does not need an infected file or human interaction to spread

A worm can spread very quickly across a network once it has infiltrated it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How does a Trojan work

A

A Trojan is a harmful program that looks like legitimate software so users are tricked into installing it

a Trojan secretly gives the attacker back door access to the system

Trojans do not self replicate or infect other files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How does spyware work

A

Spyware secretly records activities of a user on a computer

The main aim of spyware is to record usernames, passwords and credit card information.

All recorded information is secretly passed back to the attacker to use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How does a keylogger work

A

A keylogger secretly records the key presses of a user on a computer.Data is stored or sent back to the attacker

the main aim of a keylogger is to record usernames, passwords and credit card information

keylogger can be downloaded or plugged into the USB port

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How does ransomware work

A

Ransomware locks files on a computer system using encryption so that a user can no longer access them

The attacker demands money from the victim to decrypt(unlock) the data.

Attackers usually use digital currencies like bitcoin which makes it hard to trace them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How does a DOS attack work

A

a DoS (denial of service)attack is when a computer repeatedly sends requests to a server to overload the system.A server overload will slow the system and may take websites offline temporarily

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How does a brute force attack work

A

Every possible combination is tested in order from start to finish.This is not quick but it should break the password eventually

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How does data interception work

A

When data packets on a network are intercepted by a third party (eg hacker) and copied to a different location than the intended destination

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the purpose of penetration tests

A

The purpose of penetration tests is to review the systems security to find any risks of weaknesses and to fix them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is anti malware software used for

A

Used to locate and delete malware like viruses on a computer system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Why must anti malware be updated daily

A

New forms of malware are created each day by attackers so to adapt anti malware must be updated daily

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Why must secure passwords be used

A

A secure password minimises the chances of unauthorised users accessing a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What forms of physical security are there

A

Keycards, security staff, cctv cameras and alarms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

how is a lock used to prevent access to data

A

A lock can be used to prevent access to server rooms or locations that store confidential data.Only authorised personnel with a matching key will have access

17
Q

How would a biometric device be used

A

Requires the input of human characteristics such as fingerprint, iris or voice.
The biometric data is checked against previously inputted data in a database