1.4 Network Security Flashcards

1
Q

What are the types of network attacks?

A
  • Data interception and theft
  • Brute-force
  • Denial of Service (DoS)
  • SQL injection
  • Malware
  • Phishing -> social engineering
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Data interception and theft

A

Sensitive information travelling on a network is intercepted using monitoring hardware and software like packet sniffers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Brute-force

A

Automated software is used to try millions of potential passwords until one works

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Denial of Service (DoS)

A

Hacker prevents users from accessing a network or website by flooding it with useless traffic/requests

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

SQL injection

A

SQL code typed into input boxes on a website -> can gain access to databases behind the website if it doesn’t have strong input validation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Malware

A

Software designed to damage or disrupt a device or network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Types of malware

A
  • Spyware
  • Scareware
  • Ransomware
  • Rootkit
  • Viruses
  • Worms
  • Trojans
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Spyware

A

Monitors user actions and sends info to the hacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Scareware

A

Tricks user into paying to fix fake problems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Ransomware

A

Encrypts files. User pays for decryption key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Rootkit

A

Gives hackers admin access to the system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Viruses

A

Attached to other files. Only run or replicated when the file is opened

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Trojans

A

Malware disguised as legitimate software. Do not replicate themselves.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Social Engineering

A

Gaining access to networks or sensitive information by using people as a system’s weak point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Phishing

A

Hackers impersonate well-known businesses sending emails or messages to you. They contain links to fake websites that ask users to update their personal information, which the criminal steals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Passwords

A

Prevent unauthorised users from accessing a network. They should be strong and changed regularly to protect against brute-force attacks.

17
Q

Encryption

A
  • Data translated into a code that needs a specific decryption key to access
  • Limits the effectiveness of data interception attacks and SQL injections
18
Q

User access levels

A

It can control:
- Who has access to sensitive data
- Who has read/write access to files
- Who can change access levels of other users

19
Q

How can user access levels prevent network attacks?

A

Limits the number of people who can access sensitive data and important files -> makes social engineering and malware attacks less effective

20
Q

Anti-Malware Software

A

Prevents malware from damaging a network and the devices on it

21
Q

Firewalls

A
  • Examine all data entering and leaving a network
  • Identify threats using a set of security rules, blocking unauthorised access and unwanted data
  • Protect against most types of attack
22
Q

Physical Security

A

Protects physical parts (like servers) of a network from damage
- Locks and passcodes -> restrict access to areas like server rooms
- Surveillance -> equipment can deter intruders

23
Q

Penetration Testing

A
  • Hire specialists to stimulate attacks -> identify and report network security weaknesses.
  • Weaknesses can be fixed to help to protect against real network attacks