1.4 Network Security Flashcards

1
Q

Virus -

A

A malicious piece of software that infects other files. It can only replicate if the file is opened and run. A virus will replicate and infect other susceptible files, but requires human computer users to spread them from computer to computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Worm -

A

A complete standalone piece of malicious software that can spread by itself without any human interaction.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Trojan -

A

A piece of malicious software that tricks users into downloading by making it look like it is something useful.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Denial of Service (Dos) attack -

A

Any attack on a system that denies you (and others) of a service.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Distributed Denial of Service (DDoS) attack -

A

Infecting hundreds or thousands of computers with Trojans that can all be triggered at once to send a flood of IP data packets to a server and overwhelm it and crash

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Brute Force attack -

A

Guessing thousands (or millions or even billions!) of password combinations until they crack the password. This is sometimes called a “dictionary attack” because it goes through all the words of the dictionary first.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Phishing –

A

emails sent to numerous email addresses in the hope that some of the recipients will fool for the scam.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Social Engineering -

A

Any method that hackers use to trick PEOPLE into either downloading malicious software or giving out personal information. Phishing is a form of social engineering.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

SQL Injection -

A

when a hacker types SQL code into the input box of a form and submits it. The SQL code could allow a hacker to view usernames and passwords stored in a database.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Data interception and theft -

A

Cyber criminals (hackers) can intercept data as it is travelling across the Internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Poor network policies -

A

Network policies are rules that users must stick to when using a network (e.g. password length and rules on email use). Poor network policies make a network more vulnerable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Penetration testing -

A

when companies pay professional hackers to hack into their systems and find vulnerabilities. Any vulnerabilities (security weaknesses/holes) must be reported by the hacker.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Network forensics -

A

monitoring a network and capturing network traffic (data packets) and alerting the administrator to any issues.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Firewall

A

blocks unwanted access to the network from the Internet. Firewalls inspect incoming data packets to see if they are legitimate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Network Policies -

A

rules and guidelines on what users can and can’t do as well as the software to implement these rules.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

User Access Policy –

A

Making sure all users have accounts with usernames and passwords.

17
Q

Acceptable Use Policy

A

Making sure users use the network appropriately and for example don’t access personal email accounts that might result in viruses being downloaded.

18
Q

Backup and Recovery Policy –

A

What happens in the event of a disaster

19
Q

Anti-Malware software -

A

scans a computer system and alerts to any malware.

20
Q

Encryption -

A

scrambling data so that only the intended recipient can understand it. Anyone that tries to steal the data will not be able to read it unless they have a key.

21
Q

Physical Security Methods

A

CCTV, Security Guards