1.4 Network Security Flashcards

1
Q

How are viruses used?

A
  • Self-replicating
  • Dormant until host program is run
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the purpose/effect of viruses?

A
  • Send spam
  • Steal data
  • Infect other computers
  • Corrupt/Delete files
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How are trojans used?

A
  • Disguised as another legitimate program
  • Can only function if host program is run
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the purpose/effect of trojans?

A
  • Data theft
  • Redirecting search requests
  • Installing other malware
  • Opening a back door for external control over device
  • Used to create botnets for DDoS
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How are worms used?

A

Replicate and distribute independently

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the purpose/effect of worms?

A
  • Designed to spread quickly
  • May cause no damage
  • DoS
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How is spyware used?

A
  • Installed without the user’s knowledge
  • Can monitor internet usage
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the purpose/effect of spyware?

A
  • Intends to capture data and relay information to the hacker
  • Keyloggers are used to track key inputs and recognise passwords and sensitive data such as bank details
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How is ransomware used?

A

Locks computers or encrypts files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the purpose/effect of ransomware?

A

The attacker can then demand a fee for the release of files/computer though there is no guarantee of their return

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How is phishing used?

A
  • Victim receives a message disguised as a reputable source that includes a link
  • Often sent in bulk
  • Uses scare tactics such as “your account has been suspended”
  • Spear phishing is more personal and effective
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the purpose/effect of phishing?

A
  • Tricks victims into revealing personal details
  • Installs malware on the victim’s device
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How is pharming used?

A
  • Registering a similar web address to a legitimate one e.g. change of domain
  • DNS poisoning is where the DNS server of a legitimate site is hacked so that when the real web address is entered, the victims are transferred to a fake one
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the purpose/effect of pharming?

A

Tricks victims into revealing personal details

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How is blagging used?

A

The attacker attempts to engage in an online conversation with the victim

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the purpose/effect of blagging?

A

Tricks victims into revealing their personal details

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

How is shoulder surfing used?

A

Physical monitoring of someone e.g. over their shoulder or CCTV

18
Q

What is the purpose/effect of shoulder surfing?

A

To gain PIN or room codes or passwords

19
Q

How is MITM used?

A
  • Hacker connects to a connection between devices
  • Users are unaware of hacked connection
  • Can be done by setting up free unencrypted Wi-Fi
20
Q

What is the purpose/effect of MITM?

A
  • Steal data
  • Alter data for the recipient
21
Q

How is DoS used?

A
  • Sends a server many requests (flooding)
  • DDoS attack comes from a botnet
22
Q

What is the purpose/effect of DoS?

A

Slows down or crashes server

23
Q

How is SQL injection used?

A

Manipulating an SQL query so that additional code can be read by the system

24
Q

What is the purpose/effect of an SQL injection?

A
  • Bypass sign-in systems
  • Extract data
  • Delete data
  • Update data
  • Install data
  • Execute commands
  • Download malware
25
How is brute force used?
- Uses a computer program to generate all possible password combinations and try them out - Can use lists of common and cracked passwords first
26
What is the purpose/effect of brute force?
Gain access to a victim's account
27
What attacks are prevented by penetration testing?
DoS and SQL injection
28
How does penetration testing work?
Weaknesses in current security can be identified and modified accordingly
29
How does anti-malware work?
Identifies malware to be removed
29
What attacks does anti-malware prevent?
Malware
30
What attacks does a firewall prevent?
- Malware - Pharming - Blagging - Phishing - DoS
31
How does a firewall work?
- Can filter malicious packets - Prevents hackers from gaining access - Malicious websites can be blocked
32
What attacks does user access levels prevent?
Malware
33
How do user access levels work?
Prevent malware being spread by any user
34
What attacks do strong passwords prevent?
Brute force
35
How do strong passwords work?
Can stall attack till identified and removed
36
What attack does encryption prevent?
MITM
37
How does encryption work?
Renders data incomprehensible to hackers without the necessary decryption tools
38
How does physical security work?
- Cover any physical password entries with your hand - Check for any suspicious individuals attempting to view your entry - Prevents people from viewing your passwords
39
What attacks does physical security prevent?
Shoulder surfing