1.3.3.9/10 Network Security Flashcards

1
Q

What are the aims of network security?

A

Only allow authorised users to access what they need.

Prevent unauthorised access.

Minimise the potential damage caused by unauthorised access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the 3 types of hackers?

A
  • Black-hat hackers
  • Grey-hat hackers
  • White-hat hackers
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does a black-hat hacker do?

A

They attempt to gain access via nefarious means, typically to steal company secrets or cause damage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does a grey-hat hacker do?

A

They are not employed by a company, but they still attempt to locate flaws in company-wide computer systems as a hobby. What they do is technically illegal, but they then inform the company of the flaw so the company can fix it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does a white-hat hacker do?

A

These are security experts (often ex-hackers) employed by a company. Also known as ethical hackers, they use their expertise to try and find vulnerabilities and fix them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does the term “malware” mean?

A

An umbrella term that covers any computer code written with the intent to frustrate or harm.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the common types of malware?

A

Virus

Spyware

Denial-of-Service attack

SQL injection

Social engineering

Phishing (Social engineering)

Pharming (Social engineering)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a virus?

A

A piece of code capable of copying itself and spreading throughout a system. They are typically designed to have a detrimental effect like corrupting a file system or destroying data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is spyware?

A

A form of malware that covertly obtains information about a user’s computer activities by transmitting data from their device.

It can be used in a variety of ways to harvest all sorts of sensitive and personal data from a device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the different ways in which spyware is used?

A

Internet surfing habits

Email addresses

Visited web pages

Downloads/download habits

Passwords

Credit card numbers

Keystrokes

Cookies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a Denial-of-service (Dos) attack?

A

The attacker floods a server with useless traffic, causing the server to become overloaded.

Many of the past Dos attacks take advantage of the limitations of the TCP/IP stack.

They often target web servers of high-profile organisations such as banks, large scale e-commerce businesses and governments.

They typically cost a great deal of time and money to handle.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a Distributed Denial-of-service (DDos) attack?

A

Multiple systems orchestrate a synchronised attack on a single computer system.

These multiple systems are in different locations and in some instances, the owners of these systems are unaware they’re being used. This leaves them with the classification of zombie.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is SQL injection?

A

A code injection technique used to attack data-driven applications. This attack is used to breach poorly coded database applications. Code is entered into input text boxes that are executed by the server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What does Social Engineering mean?

A

An umbrella term describing the various types of malware that prey upon human error with the intention of obtaining private information or access to a system.

Social engineering scams lure users into exposing data, spreading data or providing access to a system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are some examples of social engineering scams used?

A

Baiting

Scareware

Pretexting/blagging

Phishing

Pharming

Shoulder-surfing

Quid pro quo

Vishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is phishing?

A

An online fraud technique used by cybercriminals to trick users into giving out personal information such as usernames, passwords and credit card details.

Perpetrators disguise themselves as a trustworthy source in an electronic communication such as email or a fake website.

17
Q

What is pharming?

A

The use of malicious code installed onto a PC or a server that misdirect users to fraudulent sites without their knowledge.

18
Q

What are some ways cyber threats can be prevented and minimalised?

A

Firewalls

Secure passwords

Anti-virus/Anti-spyware software

Proxies

Encryption

19
Q

What is a firewall? What does it do?

A

A piece of software or hardware that is configured to let only certain types of traffic through it. Setting up a firewall can prevent:
- Unauthorised internet traffic outside a LAN
- Users in a LAN from accessing parts of the internet prohibited by the company they work for.

Firewalls can block certain ports and types of traffic. It can also inspect data travelling across it to see if it looks suspicious.

Operating systems and routers come with built in firewalls. More sophisticated firewalls can be purchased separately.

20
Q

What is Anti-virus/spyware software?

A

These applications come pre-installed with your operating systems, though you can purchase and install others from dedicated companies.

Detects and deletes these strains of malware from a system.

21
Q

Why is keeping software up to date necessary?

A

It is crucial to always add the latest patches to a system as early builds are often exploited by more bugs and malware.

22
Q

What is a proxy?

A

A physical device placed between a network and a remote source. All traffic travels through the device on its way in and out of a network.

Proxies ensure there is no direct, physical connection between a user and a remote source.

Proxies hold some cache so users can access their regularly visited websites without needing the internet.

Proxies do not encrypt data, making them less secure than Virtual Private Networks (VPN)

Proxies allow for anonymous internet usage.

23
Q

How can a proxy be used for web requests?

A

If the web page is not on the proxy’s ban list, it will be moved onto the request list. It can also look at the page itself and determine whether it should pass this to the user or not.

24
Q

How are humans susceptible to cyber-threats? (How are people the weak point?)

A

Sharing passwords

Losing memory sticks/laptops

Writing passwords down near the computer

Leaving printouts on desks

Not logging off/locking computers

Not installing operating system updates

Not keeping anti-malware up to date.

Not encrypting data

Not applying security to wireless networks