1.4 - Network security Flashcards

1
Q

What are the forms of attack?

A
  • Active
  • Passive
  • External
  • Internal
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is an active attack?

A

Where the hacker attempts to modify or delete data

or

to prevent a network from operating correctly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a passive attack?

A

Where the hacker monitors a network in order to gain information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a passive attack also known as?

A

Eavesdropping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is malware?

A

Malicious software that is designed to hack a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is an Internal attack?

A

Where someone within an organisation attempts to hack its network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is an External attack?

A

Where someone outside of an organisation attempts to hack its network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Social engineering?

A

Tricking others into revealing their personal data by posing as a trusted source

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Give some examples of some types of Social engineering:

A
  • Phishing
  • Shoulder surfing
  • Blagging
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is phishing?

A

An attempt to gain personal information about someone by way of deception by email

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a Brute force attack?

A

Automated or manual attempts to gain unauthorized access to secure areas by trying all the possible password or key combinations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How can a Brute force attack be sped up?

A

If multiple computer systems are used

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a DoS attack?

A

Severs & devices are flooded w/too many requests/ packets, causing them to crash or become unstable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What does DoS stand for?

A

Denial of service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a DDoS?

A

A coordinated attack using a botnet of infected systems to overload a server with requests

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What does DDoS stand for?

A

Distributed Denial of Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is a botnet?

A

A large group of devices controlled and use maliciously by an attacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is Data interception & theft?

A

Data may be intercepted during transmission, but physical theft can occur where storage devices/ data files are left insecurely

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What are SQL injections?

A

Pieces of malicious SQL is entered into a website’s input box which then reveal sensitive information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

When is a SQL used?

A

To search databases/ access information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What does SQL stand for?

A

Structured Query Language

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Describe what happens when data is entered into a webform?

A

The website will contact the database server to find the account details & display them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Describe what happens when a hacker enters a malicious SQL into the password field:

A

It will modify the SQL that is executed
—> They can gain administrator privileges or view + edit contents of the database

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is Interception?

A

When data packets on a network are intercepted by a third party and copied to a different location than the intended destination

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Name the software that is used in **interception**
Packet sniffers
26
What is **Blagging**?
Dishonestly persuading someone to divulge personal information by deception
27
Give an example of **Blagging**
Someone makes up a story to gain a person’s interest and uses this to encourage them to give away information about themselves, or even send money
28
What is **Shouldering**?
Looking over someone's shoulder when they enter a password or PIN
29
What is **spyware**?
Software that secretly records the activities of a user on a computer
30
What is **keyloggers**?
Secretly records the key presses of a user on a computer ---> Data is sent back to the attacker
31
What is the *main aim* of **keyloggers and spyware**?
To record usernames, passwords & credit card information
32
What are **worms**?
Self-replicate without any user help. They spread from system to system by finding weaknesses in software. ---> Spread very quickly
33
What are **Viruses**?
Self replicates without any user help and spreads from system to system by attaching itself to infected files
34
How are **viruses** activated?
When opened by a human
35
What is **Trojans**?
Malware that is disguised as legitimate software - users are tricked into installing it
36
How are *Trojans* spread?
Users install them not realising they have a hidden purpose ---> Gives the attacker a backdoor access to the system
37
What is **Ransomware**?
Locks files on a computer system using encryption so that a user can no longer access them
38
What is the *main aim* of **Ransomware**?
Attacker demands money from the victim to decrypt the data
39
Why are **ransomware attackers** so hard to *trace*?
They use digital currencies (like bitcoin) which makes it hard to trace them
40
What measures should organisations be taking to prevent their network from having any *vulnerabilities*?
* Regularly test network & find any weaknesses * Use passwords * Enforce user access levels * Install anti-malware software & firewall * Encrypt sensitive data
41
Why should organisations be **using passwords** to prevent their network from having any *vulnerabilities*?
To prevent unauthorised people from accessing the network
42
Why should organisations **Enforce user access levels** to prevent their network from having any *vulnerabilities*?
To limit the number of people with access to sensitive information
43
What do **user access levels** determine the access to?
* Software * Email * Internet access * Documents and data * Ability to install and/or remove software * Ability to maintain other users' accounts
44
What is **encryption**?
The process of scrambling data into an unreadable format so that attackers cannot understand it if intercepted during transmission
45
How is *data* **encrypted**?
Using an encryption key - only at the correct destination will the encryption key convert the data back into its original form
46
What is **anti-malware software**?
Software used to locate and delete malware (like viruses) on a computer system
47
How does **anti-malware software** work?
* Software scans each file on computer and compares it against a database of known malware. * Files w/ similar features of malware are identified and deleted.
48
Why must **anti-malware software** be regularly **updated**?
New forms of malware are created each day by attackers, therefore it must be regularly updated to keep systems secure
49
What are some other *roles* of **anti-malware software**?
* Checks all incoming and outgoing emails + attachments * Checks files as they are downloaded * Scans the hard drive for viruses and deletes them
50
Why should organisations **Install anti-malware software & firewall** to prevent their network from having any *vulnerabilities*?
To prevent & destroy malicious software attacks
51
Give some examples of **anti-malware**?
* Anti-virus software * Anti-phishing tools * Anti-spyware software
52
What is the main *disadvantage* of anti-malware?
It can only detect, prevent and remove known malware
53
What is a **firewall**?
A tool that examines all data entering & leaving the network & block any potential threats
54
How does a **firewall** check whether a *data packet* should be given **access to the internet**?
It examines the source and destination address of each data packet
55
What are some *roles* of a **firewall**?
* Blocks access to insecure websites * Blocks certain programs from accessing the internet * Blocks unexpected / unauthorised downloads * Prevents specific users on a network accessing certain files
56
How can **physical security** be used to protect computer systems?
* Lock - Can be used to prevent access to certain locations that store confidential data (e.g. Server rooms) * Biometric devices - Require input of a human characteristic. When inputted, this is checked against a database and will allow access to a certain user * CCTV cameras * Alarms
57
What is *Penetration testing*?
When organisations employ specialists to *simulate* potential attacks on their network
58
What is *Penetration testing* used for?
To identify possible weaknesses in a network's security by trying to exploit them ---> Results are then reported back
59
What is *Penetration testing* also known as?
Pentesting
60
Give some common prevention methods for **Spyware**?
Anti-spyware
61
Give some common prevention methods for **Viruses**?
Anti-malware
62
Give some common prevention methods for a **DoS attack**?
Having a firewall
63
Give some common prevention methods for a **Brute-force attack**?
Strong passwords
64
Give some common prevention methods for **Phishing**?
User awareness
65
Give some common prevention methods for **Blagging**?
User awareness
66
Give some common prevention methods for **Shoulder surfing**?
Concealing passwords/ PINs
67
Give some common prevention methods for a **SQL injection**?
Penetration testing
68
What are features of a **strong password**?
*At least eight characters * Include upper case * Include lower case * Include special characters * Include numbers