1.4 network security Flashcards

1
Q

6 Different forms or attack

A
  • Malware
  • Phishing
  • Brute force
  • Denial of service
  • Data interception and theft
  • SQL injection
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Malware

A

Software written to infect computers and commit crimes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Malware Crimes

A
  • Fraud
  • Identity theft
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Examples of malware

A
  • Viruses
  • Trojans
  • spyware
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Phishing

A

Someone disguising themselves as a trustworthy source in a electronic communication such as emails or fake website

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Phishing purpose

A

Designed to get you to give away personal information:
- Usernames
- Passwords
- Credit card details

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Brute force attack

A

Trail an error program to try and decode encrypted data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Denial of service

A

Flooding a server with useless traffic causing the server to become overloaded and unavailable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Data interception and theft

A

An attacker monitors data stream to and from a target in order to gather sensitive information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Malware threats

A
  • Files deleted, encrypted or corrupt
  • PC crash, reboot spontaneously and slow
    down
  • Internet connection becomes slow
  • Keyboard inputs are logged and sent to
    hackers
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Phishing threats

A
  • Access victim account to withdraw money or
    purchase merchandise
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Denial of service threats

A
  • Damage to reputation
  • Lost in profits
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Data interception and theft threats

A
  • Theft of data
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How to prevent malware

A
  • Firewall
  • Anti-virus
  • Enabling OS and security software updates
  • Staff training
  • Backup files regulary
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How to prevent phishing

A
  • Strong security software
  • staff trainingH
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How to prevent brute force

A
  • Progressive delays
    -network lockout policy
  • Using effective passwords
17
Q

How to prevent DDOS

A
  • strong firewall
    = Packet filters on routers
    -H
18
Q

How to prevent data interception and theft

A
  • Encryption
  • using virtual networks
  • investigating own network vulnerability
19
Q

How to prevent SQL injections

A
  • Validation input boxes
  • penetration testing
  • using parameters queries
20
Q

Physical security

A
  • CCTVS
  • fences
  • security guards
  • alarms
  • doorlocks