1.4 Network security Flashcards

1
Q

What are the 4 forms of attack on networks?

A

insider attack
passive attack
active attack
social engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is an active attack?

A

When someone uses malware or other technical methods to compromise a network’s security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a passive attack?

A

When an attacker eavesdrops on a network by ‘sniffing’ the data packets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is an insider attack?

A

When someone in an organisation gives away access details or sensitive information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is social engineering?

A

When a person is exploited into giving away critical information that gives access to the network or accounts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is penetration testing?

A

A controlled attack on a network used to find vulnerabilities in a network’s security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What will a good penetration test check?

A

Likelihood of social engineering
Technical vulnerabilities
a test of damage recovery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is malware?

A

Any kind of malicious software that is installed without your knowledge or consent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How does a worm differ from a virus

A

A virus has a host program whereas a worm spreads without a host program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are Trojan horses?

A

Any form of malware that tricks a user into installing it by pretending to be a different program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What does ransomware do?

A

Encrypts files on an infected system and only decrypts files once a payment has been made to the hacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does Spyware, Rootkits and Backdoors do?

A

Spyware: gathers information about a user by tracking their activity

Rootkits: modifies the computer’s operating system to avoid detection by antivirus software

Backdoors: Opens up an access channel to a computer that other malware can use to take control of the machine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are three ways that malware can spread?

A

(self) replication
installations
attachments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are ways we can defend social engineering?

A

Education and training

Company security policies

Public awareness campaigns

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

1) what is phishing?

2) what are ways to protect against phishing?

A

1) common form of social engineering which uses fake emails and websites to trick uses into giving away sensitive details.

2) Confirming the sender’s email address, looking through the email’s SPAG, never clicking on links that ask you to enter details.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are 2 common active attacks?

A

Cracking passwords

Denial of service (DoS) attacks

17
Q

How does a Distributed Denial Of Service (DDoS) attack work?

A

lots of requests sent from a botnet to try and prevent a network from functioning

18
Q

What is a “botnet”?

A

An army of compromised machines