1.4 Network security Flashcards

1
Q

What are examples of malware?

A

-Scareware
-Ransomware
-Spyware
-Rootkits
-Opening backdoors
-Viruses
-Worms
-Trojans

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is malware?


A

Malicious software that is installed without the person knowing and can harm devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is scareware?


A

Tells the user their computer is infected with loads of viruses to scare them into following malicious links / paying for problems to be fixed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is ransomware?

A

Encrypts all the files on a computer and the user recieves a message demanding a large sum of money in exchange for a decryption key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is spyware?

A

Secretly monitors user actions like key presses and sends information to hacker.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are rootkits?

A

They alter permissions to give malware and hackers administrator-level access to devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are opening backdoors?

A

Holes in someone’s security which can be used for future attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are viruses?

A

They attach to certain files by copying themselves and are spread by users by copying infected files and activating them by opening infected files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are worms?

A

Similar to viruses but self-replicate without any user help therefore they spread very quickly and exploit weaknesses in network security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are trojans?

A

Malware disguised as legitimate software and users install them not realising they have a hidden purpose. Doesn’t replicate like worms / viruses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a social engineering?

A

A way of gaining sensitive information / illegal access to networks by influencing people.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is an example of social engineering?

A
  1. Someone rings up an employee of a company.
  2. They pretend to be a network administrator / somebody within same organisation.
  3. They gain the employee’s trust.
  4. They persuade them to disclose confidential information like personal log in details or sensitive company data.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is phishing?

A
  1. Criminals send emails / texts to people claiming to be from a well-known business.
  2. The emails / texts contain links to spoof versions of the company’s website and then they request the user to update their personal information.
  3. When the user inputs this data into the website, they hand it all to criminals who can access the user’s genuine account.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Why are phishing emails sent to 1000s of people?


A

In the hope that someone will read the email and believe its content is legitimate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a brute force attack?


A

-A type of active attack used to gain information by cracking passwords through trial and error.
-Use automated software to produce hundreds of likely password combinations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is an insider attack?

A

Someone within an organisation exploits their network to steal information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

How can you reduce risk of brute force attack?

A

-Lock accounts after a certain number of failed password attempts.
-Use strong passwords.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is a denial of service (DOS) attack?

A

Hacker tries to stop users from accessing a part of a network or website by flooding the network with useless traffic so the network is extremely slow or completely inaccessible.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is an active attack?

A

Someone attacks a network with malware or other planned attacks.

20
Q

How to prevent an active attack?

A

Firewall

21
Q

What is a passive attack?

A

Someone monitors data travelling on a network and intercepts any sensitive information they find by using network-monitoring hardware and software.

22
Q

Why are passive attacks hard to detect?

A

The hacker is quietly listening.

23
Q

How do you prevent a passive attack?

A

Data encryption.

24
Q

What is data interception and theft?

A

-Example of passive attack where data is intercepted during transmission.
-This is done using software called a packet sniffer, which examines data packets as they are sent around a network, or across the internet.
-The gathered information is then sent back to the hacker.

25
Q

How does an SQL (Structured Query Language) injection work?

A

SQL code is entered as a data input into databases which use SQL code to interrogate the data and maintain the structure. The inputted code can cause errors or unintended operations.

26
Q

What is a poor network policy?

A

Where a network does not have security rules in place for users to follow.

27
Q

What is anti-malware software?

A

Loads of types and designed to find and stop malware from damaging a network and the devices on it.

28
Q

What are user access levels?

A

Control which parts of the network that different groups of users can access to help limit the number of people with access to important data and prevent insider attacks on the network.

29
Q

What is a firewall?

A

A network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules to prevent unauthorised access to or from a private network.

30
Q

How to reduce risk of phishing?

A

Look for giveaways like incorrect spelling / grammar and ensure you treat your personal details with caution.

31
Q

Which networks are vulnerable to SQL injections?

A

Networks which use databases.

32
Q

What is an SQL (Structured Query Language) injection?


A

Give criminals easy access to insecure data if a website’s SQL code is insecure as the hackers are able to get past the website’s firewall.

33
Q

What is the importance of using strong passwords?

A

Weak passwords can easily be guessed / cracked which leaves your accounts vulnerable to unauthorised access.

34
Q

Strong passwords consist of:

A

-Minimum of 8 characters
-Mix of uppercase and lowercase
-Numbers
-Special symbols

35
Q

What is penetration testing?

A

Organisations employ specialists to simulate potential attacks on their network to identify possible weaknesses in their network security by trying to exploit them and these results are then reported back.

36
Q

How to prevent an SQL injection?

A

-Can detect them through penetration testing before putting a system live.
-Ensure database access permissions are appropriate.
-Check appropriate validation is being done on any data entered.

37
Q

What are examples of two-factor authentication?

A

-Something the user knows like a password.
-Something the user has like a smartphone.

38
Q

What are passwords?

A

Help prevent unauthorised users from accessing the network.

39
Q

What is cypher text?

A

Encrypted text / data.

40
Q

What is encryption?

A

Data is translated into a code which only someone with the correct key can access meaning unauthorised users cannot read it and is essential for securely sending data over a network.

41
Q

What is plain text?

A

Non-encrypted text / data.

42
Q

Why is it important to keep software up to date?


A

Updates often include security patches that address known vulnerabilities and so failure to update software can leave your system vulnerable to attacks which exploit these vulnerabilities.

43
Q

What should organisations do to ensure network security?

A

-Regularly test network to find and fix security weaknesses.
-Strong passwords.
-Enforce user access levels.
-Anti-malware software.
-Encrypt sensitive data.

44
Q

What are examples of physical security?

A

-Locks and passwords to restrict access to certain areas.
-Surveillance equipment like cameras / motion sensors to detect intruders.

45
Q

What is physical security?

A

Protects the physical parts of a network from either intentional / unintentional damage (fire or flooding etc).

46
Q

What is biometric testing?

A

Uses unique physical characteristics and features to identify people when they are using a computer system

47
Q

What are examples of biometric testing?

A

-Facial recognition.
-Fingerprint scan.