Network Security Flashcards

(48 cards)

1
Q

What are all the potential threats to a network?

A
  1. Malware
  2. Social engineering, e.g Phishing, people as the ‘weak point’
  3. Brute force attacks
  4. Denial of service attacks
  5. Data interception and theft
  6. SQL injection
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Etymology of malware

A

Malicious & Software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is malware?

A

Malware are executable programs that run on a computer and ‘infect’ it. There are different types of malware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Types of malware

A
  • viruses
  • worms
  • trojans
  • ransomware
  • spyware
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What do viruses do?

A

• Attach themselves to legitimate files or programs.
• Spread when the infected file is opened, ie. requires human action to do this
• Can corrupt data, slow systems, or delete files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What do worms do?

A

• Spread automatically across networks without user action.
• Often cause network congestion and system slowdowns.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What do trojans do?

A

• Disguised as legitimate software.
• Open a “backdoor” for attackers to access your system.
• Commonly used to steal data or install additional malware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does ransomware do?

A

• Encrypts your files/data and demands payment to unlock (ie. decrypt) them
• Only way to recover the data is likely to be via backups

This happened to Marks and Spencer in 2025

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does spyware do?

A

• Secretly monitors your activity by capturing your keystrokes
• Can obtain your passwords, banking details for example.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is social engineering?

A

• Social engineering is the ability to obtain confidential information by asking people for it
• It is based on the premise that ‘People are the weakest link in any system / network’
• Can take many forms including:
• Shoulder Surfing
• Phishing
• Pretexting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is shoulder surfing?

A

• Shoulder surfing is the ability to get information or passwords by observing as someone types them in
• The following are two examples:
• Looking over someone’s shoulder
• Using a CCTV camera

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is pretexting?

A

Impersonating an IT or Account support representative use this false identity to deceive the victim into providing confidential information or granting access to secure areas

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is phishing?

A

• Phishing is a type of social engineering technique
• Emails mainly (or texts) are sent to users commonly
pretending to be from a bank or website
• The ‘From’ email address may be forged
• These messages will try to get
personal information via a link such as:
• Usernames
• Passwords
• Credit card details
• Other personal information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How to spot a phishy email?

A

• Greeting: The phishers don’t know your name – just your email address, so the greeting is not personalised
• The sender’s address is often a variation on a genuine address
• Forged link: The link looks genuine, but it may not link to the website given. Roll your mouse over it to check
• Request for personal information: Genuine organisations never do this
• Sense of urgency: Criminals try to persuade you that something bad will happen if you don’t act fast
• Poor spelling and grammar

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Intended impact of social engineering

A

• Obtain personal information and profit from it
• Gain access to personal data / sensitive files
• Install malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Brute force attacks

A

• In a brute force attack, a hacker will try every combination of password until the correct password is found
This is done using a computer program.
The purpose is to gain access to a computer
system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is a Denial of Service (DoS) attack?

A

• In a denial of service attack, a hacker will use or infect a computer so that:
• it sends as many requests to the server as it can (‘flooding’ the server with requests)
• the server can’t respond fast enough so slows down or goes offline
• In a distributed denial of service attack (DDoS), many computers are used to send the requests

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Impact of DoS attack

A

A DoS attack is is a malicious act aimed at rendering a
computer system, network, or service unavailable to its
intended users.

To Customers:
• unable to access the desired website/service

To Company:
• reputational damage
• financial loss (depending on severity and duration)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is data interception?

A

• The attacker can intercept communications between the one device and another on a network
• This is done via a network sniffer - Network sniffing is the process of monitoring and capturing all the packets
passing through a given network using sniffing tools

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What are network sniffers?

A

• A network sniffer is either software or hardware that can intercept data packets as they travel across a network.
• Legitimate uses include:
• Tracking down network traffic bottlenecks
• Testing firewalls for network security efficacy
• Acquiring statistical data on network bandwidth,
availability, etc.
• But clearly can be used for the wrong reasons by a hacker

21
Q

When are you most at risk of data interception?

A

Connecting to unencrypted Wi-Fi makes it easy for your data to be intercepted

22
Q

What is data theft?

A

• Digital devices are often targeted by criminals. Data on
them can be accessed in a variety of ways:
• Loss of a mobile phone can lead to the loss of all the data stored on it, including passwords, account numbers and credit card details
• Malware which targets digital devices may create ‘back doors’ to give malicious users access to your device
• Many apparently legitimate apps are malicious and may lead to theft of your personal information

23
Q

How to reduce the risk of data theft?

A

• Use the password feature and choose a strong password
• Make sure the data is encrypted
• Do not follow links in suspicious emails
• Don’t install apps without researching them first – if they require unnecessary extra permissions, don’t install them
• Delete all information stored on your device before discarding

24
Q

What is SQL injection?

A

• SQL (Structured Query Language) is a database query
language
• SQL injection takes advantage of web input forms to access or destroy data
• Malicious SQL commands can be input into web forms instead of the expected ‘real’ data
• This can be interpreted by vulnerable web applications and end up causing damage or releasing personal information

25
How does an SQL injection work?
1. Hacker identifies vulnerable, SQL-driven website & injects malicious SQL query via input data 2. Malicious SQL query is validated & command is executed by database 3. Hacker is granted access to view and alter records or potentially act as database administrator
26
Impact of SQL injection
Depends on the malicious SQL injected, but includes: • Unauthorised access to data • Modification of data • Deletion of data
27
Methods to identify and prevent vulnerabilities include:
1. penetration testing 2. anti-malware software 3. firewalls 4. user access levels 5. passwords 6. encryption 7. physical security
28
What is penetration testing?
• ‘Pen’ testing is the practice of deliberately trying to find security holes in your own systems • The goal of penetration testing is to: • identify the targets of potential attacks • identify possible entry points • attempt to break in • report back the findings
29
However, penetration testing…
..doesn't actively prevent attacks from happening. But might help you identify weaknesses which you can address. Beware context in an exam question! Only large companies would engage in penetration testing!
30
What is anti-malware software?
• Anti-malware software will detect malware such as viruses, worms, trojans, and spyware • It is running all the time and scans all incoming traffic • When it detects incoming file/data/message/data which contains malware, or it suspects it might, then it will block or quarantine the incoming file/message/data • Does this by comparing the incoming data to its database of known malware • Anti-malware software must be running all the time and up-to-date
31
What is a firewall?
• Separate a trusted network from an untrusted network (normally • Data is sent around a network in small packets of information • Incoming and outgoing packets are checked against specified rules • Firewalls can be run on dedicated hardware or as software
32
Can firewalls be built-in?
• Firewalls may be built into your hardware • This may be a dedicated unit to the task of being a firewall (eg school) • Alternatively, it may be built into other devices such as a home Wi-Fi router
33
Firewall capabilities
• DOS / DDOS ATTACKS and BRUTE FORCE ATTACKS: - Can detect unusual traffic from IP Address(es) and block it from entering the network • MALWARE - Can detect suspicious looking packets and block them from entering Has power to do more: Block users' outgoing requests -> Malicious or inappropriate websites can be blocked Block traffic originating from black-listed IP addresses
34
What are user access levels?
• Access rights may be set on disks, folders and even individual files • Restricts access for different types of user but… • ….also limits potential damage from hackers
35
What are password policies?
• Passwords are often checked as they are created to make sure that the conform to the parameters given in a required policy • Organisations and computer systems will often have password policies. These will make sure that your chosen password has features like: • Minimum length of characters • Include at least one lowercase letter • Include at least one uppercase letter • Include at least one symbol • Change password every month
36
What is encryption?
• Encryption is a way of securing data so that it cannot be understood without the encryption key • Passwords stored by websites are almost always stored in an encrypted form • If a hacker obtains the data in the password database, they won’t be able to easily understand the passwords • Devices and computers can also have their storage and hard disk data encrypted
37
What are the three types of encryption?
(A) Encryption of transmitted data (B) Encryption of individual files (C) Encryption of drives
38
What is encryption of transmitted data?
• Websites using HTTPS (Secure HyperText Transfer Protocol) encrypt the connection to the server • Your web browser sends its key and form data, encrypting it with the server’s key • The server encrypts the web page you request using your web browser’s key
39
What is encryption of individual files?
• Files can be encrypted individually on a computer using a password • They can then only be viewed by people who have the password • Software such as zip files allow encryption to be applied
40
What is encryption of drives?
• Ordinary computer drives can be encrypted so that a password is needed to access the information • This prevents a hacker from understanding the contents of the hard drive if it is removed and installed in a different computer • For removable media, can also run software which encrypts the contents of the hard disk
41
What is physical security?
• Physical security is where hardware, software and networks are protected by physical methods • An example would be security lighting
42
Physical security methods which can be adopted from computer rooms include:
• CCTV • Intruder alarms • Locks on doors or cabinets • Swipe Cards / Pin Numbers on doors • Biometrics - Face Id, Touch Id
43
To prevent malware, you can use
anti-malware software or a firewall (known suspicious IP address or content)
44
For social engineering (eg. Phishing), you can use…
a firewall (known suspicious IP address) and user access levels in terms of limiting damage
45
For brute force attacks you can use
Strong passwords and a firewall
46
For DoS attacks you can use
Firewalls (multiple requests originating from the same IP address)
47
For data interception and theft, you can use…
Encryption
48
For SQL injection, you can use…
User access levels - restricts what SQL can be executed by a user