1.4.2 Threat Prevention Flashcards

1
Q

What are examples of common protection and detection methods

A

Penetration testing
Anti-malware
Firewalls
User access levels
Passwords
Encryption
Physical security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does penetration testing do?

A

Used to find potential vulnerabilities within a computer system that could be exploited for criminal purposes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does anti-malware do?

A

Designed to spot a malicious virus, worm, Trojan, adware or spyware program and to remove it from a system or network

Must be regularly updated to meet the latest threats that appear on a daily basis.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does firewalls do?

A

Control the transmission of data between a computer and other network computers or the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the characteristics of firewalls?

A

Can be configured to apply ruled to certain programs, websites or network connections

Can be either software or hardware based – a hardware firewall is generally more expensive but more robust

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does a user access level do?

A

Are used to control the info that a specific user(s) can access, read or edit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the characteristics of a user access level?

A

May be limited to data that is relevant only to them or to protect personal info

Are essential as users are often the weakest link in any computer systems in respect to security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What do passwords do?

A

Essential in preventing unauthorised access to a computer system, but they need to be complex enough so that they cannot be guessed or calculated by hackers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does encryption do?

A

Converts info using a public encryption key into a meaningless form that cannot be read if intercepted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the characteristics of encryption?

A

Only way to decrypt the info is with a private key or cypher generated by the owner

The encryption text and the cypher are never transmitted together

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What does physical security do?

A

Practical way to protect equipment and data from external hackers.

Protects important network equipment or data by physically preventing access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are examples of physical security?

A

use of safes, locked rooms or obstacles to protect equipment

increased surveillance on equipment

removable hard drives or data storage

biometric scanners that check fingerprints, iris or facial scans or voice recognition systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What makes a strong password?

A

Make sure all passwords are at least eight characters long

Use upper0 and lower-case characters

Include special character (?, % and #)

Avoid real dictionary words

Avoid any personal info – names of family members or pets, important dates or phone numbers

Regular change passwords and never use them for more than one system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the characteristics of penetration testing?

A

Is usually carried out by security specialists that offer their services to organisations with security concerns

How well did you know this?
1
Not at all
2
3
4
5
Perfectly