1.3.3 PART 2 Network Security Flashcards

1
Q

Malware?

A

Any software designed to harm computer systems or networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Types of malware?

A

Trojan horse
Spyware
Virus
Worm
Adware
Ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Trojan horse?

A

Disguises as a legitimate program;

can’t self-replicate, Requires human intervention to install

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Spware

A

Steals data can monitor key strokes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Virus

A

Attaches & self-replicates- self executing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Worm?

A

Standalone program that can spread between file;

Doesn’t need to attach to files
Self-executing
Aims to spread across networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Adware?

A

Displays unwanted adverts for user on computer system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What’s a cyberattack?

A

An attempt by hackers to damage or destroy a computer network or system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Types of cyberattacks?

A

Phishing
Pharming
Social Engineering
Brute force attack
(Distributed) Denial of service (DDos/ Dos)
SQL Injection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Phishing?

A

Fake email from trustworthy source to steal money, gain access to sensitive data, or install malware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Pharming

A

Redirect a site’s traffic to a bogus sit, which attempts to steal details

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Social Engineering?

A

Manipulating someone to provide data / info.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Denial of Service?

A

Flooding a server with requests, preventing client requests receiving responses

If distributed- multiple attacking computers flood one server with requests.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

SQL Injection?

A

Instantiating an SQL command into a database, in order to retrieve data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Buffer overflow?

A

Occurs when a program accidently writes data to a location too small to handle it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Methods of network protection?

A

Anti-malware
Anti-spyware
Education / training
Passwords
Firewalls
Proxy servers
Code quality

17
Q

Anti-malware / anti-spyware?

A

Detects malware / spyware & removes it.

18
Q

Education / training?

A

Teaching people to:
Check emails thoroughly
Identify bogus links
Use portable media

19
Q

How can passwords protect?

A

Companies / individuals can incorporate:

A strong password policy
Use a password manager
Changing passwords yearly
2FA

20
Q

Auto-update and Auto backup?

A

An up-to-date OS improves security

Can return to backup save points- prior to malware installation

21
Q

What is a firewall?

A

Hardware/software that monitors, filters and blocks traffic/ packets being transmitted, sitting between two networks

Acting as a barrier between a trusted and untrusted network, using static filtering or stateful inspection

22
Q

What is the purpose of a firewall?

A

Attempts to prevent malicious traffic entering the trusted network

Can be configure to prevent certain data leaving the network

23
Q

What is static filtering?

A

Checking the headers of packets arriving from an untrusted network

Checks against a set of rules (packet filters) defined by the network admin

24
Q

What type of firewalls use stateful inspection?

A

Sophisticated firewalls, due to needing to carry out more intelligent filtering.

25
What is stateful inspection?
Dynamic filtering; continuously monitoring inbound/outbound traffic, after a connection is established. Analyses packet types and the payload.
26
What is a prerequisite of stateful inspection?
Firewall must maintain a connection table Tracks all conversations between networks.
27
What's a proxy server?
An intermediate stage when requesting resources from a server. This proxy makes a web request on behalf of the terminal- hiding the IP address of the requesting device- Enables anonymous surfing
28
Benefits of a proxy server?
Prevents unauthorized network access Restricts website access Protects company data and intellectual property
29
How does improved code quality reduce malware threats?
It's harder to find exploitable flaws
30