4 - Network Security + System Software Flashcards

(40 cards)

1
Q

What is Malware and give examples?

A

Malcious software. Executable programs that run on computer.
Examples: trojans, worms, viruses, ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a Virus?

A

Replicates code onto other programs. Infects other computers and harms them by deleting, corrupting or modifying files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a worm?

A

Replicates itself to spread to other computers. Causes no damage to attacked computer but slows it down.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a Trojan Horse?

A

File appears to be something user wants e.g. program, game or cracked file
Causes damage, takes control and provides access to computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Ransomware?

A

Holds computer hostage by locking or encrypting access to it. Access is restored once ransom is paid.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the 8 ways of exploiting vulnerabilities?

A

Unpatched software
Out-of-data anti-malware
Social engineering
Shoulder surfing
Phishing
Denial of Service
Man in the Middle attack
SQL injection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How is Unpatched software exploited?

A

Vulnerable software as software and security updates have not been installed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How is out-of-date anti-malware exploited?

A

If anti-virus software isn’t regularly updated then it is unable to detect latest viruses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Social engineering?

A

Ability to obtain confidential information by asking people for it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is shoulder surfing and give examples

A

Ability to get information or passwords by observing as someone types them in e.g. CCTV camera, looking over someone’s shoulder.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is phishing?

A

A type of social engineering technique where messages are sent to users pretending to be banks/ websites. Try to get personal info e.g. passwords, credit card details e.t.c

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the 6 signs of Phishing?

A

Greeting
Sender’s address
Forged link
Request for personal info
Sense of urgency
Poor spelling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is Denial of service?

A

DOS - hacker uses/infects computer to flood server with requests. Server can’t respond fast enough and slows down or goes offline.
DDOS involves multiple computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a Man in the middle attack?

A

MITM - attacker intercepts communications between user and server. Attacker eavesdrops to find personal details. Adds different info to a web page or email.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is an SQL injection?

A

Structured query language - database query language which takes advantage of web input forms to access or destroy data.
Select From Where

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the 7 ways of identifying and preventing vulnerabilities?

A

Penetration testing
Anti-malware software
Encryption
Firewalls
User access levels
Password policy
Physical Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is Penetration testing?

A

Delibarately trying to find security holes in your own systems.
Goals:
Identify targets of potential attacks
Idenitfy possible entry points
Attempt to break in
Report findings

18
Q

What is Anti-malware software and how does it work?

A

Detects malware e.g. spyware.
Process: Malware detected –> antivirus company and malware is verified and a signature is created –> virus database and computter runs update

19
Q

What is encryption and give examples of how it is used

A

Securing data so it cannot be understood without being decode with encryption key. (can still be read)
Storage and hard disk data is encrypted
HTTPS ( Secure hyper text transfer protocol)- encrypts connection to server.
Web browser send key and form data encrypted with server key. Server encrypts web page using web browser’s key. Individual files cna be encrypted with password.

20
Q

What is a Firewall and how does it work?

A

Seperate trusted and untrusted networks (normally on the internet)

Data sent around in small packets. Packets checked for origin and destination. Packets not matching filtering rules are dropped. Can be run on dedicated hardware.

21
Q

What are User access levels?

A

Access rights may be set on disks, folders and individual files.Only authorised users have access to and can edit particular files.

22
Q

What is Password policy?

A

Passwords checked so they conform to parameters given in required policy e.g. length, numvers, letters and special characters.

23
Q

What is physical security?

A

Physical methods of protecting hardware, software and networks.
Examples: CCTV, intruder alarms, locks, physical barriers and security guards.

24
Q

What is operating system software and what 6 things does it provide?

A

Manages hardware, users and software resources.

Provides: User interface, Memory managment, Multi-tasking, Peripheral management, File management + User management.

25
How does Memory Management work?
Program run and copied from storage into main memory. Data also copied into main memory. OS keeps records of programs data and location and makes sure not to overwrite existing programs and data Main memory - RAM Secondary memory- SSD HDD
26
What is Multi-tasking?
OS manages many tasks simultaneously occuring. Decode which process will run next on CPU and for whar duration. Appears that multiple tasks are running at the same time
27
What are interrupts?
Signals sent to CPU by external devices indicating an event that needs immediate attention. Hardware interrupts - generated by hardware devices e.g. printer out of paper Software interrupts - generated by programs e.g. divding by 0 error.
28
What is Peripheral management?
Receiving inputs and sending outputs to peripheral devices e.g. mouse, keyboard, printer e.t.c Device drivers: Programs that control peripheral devices. Hard disk is a storage peripheral.
29
What is File management?
Responsibe for: Naming Allocating files to folders Moving Saving Copying Deleting files
30
What is user management and access rights?
OS responsible for user logins and passwords. Access rights: User can see their own files. Users and admins have different access right levels. Some users can read but not edit a file.
31
What are the 5 types of User interface?
GUI - Graphical user interfcae Menu driven interface CLI - Command line interface Voice activated Real time
32
What does the GUI provide?
WIMP - Windows, icons, menus and pointers
33
What does the menu driven interface provide?
Start up menu used by devices with a dedicated function e.g. mp3 players, atm machines, old ipods
34
What is the CLI and what are its advantages?
Text commands are entered into the interface. Advantages: little processing, no need for expensive graphics card, faster to enter commands for expert users, less hard disk storage space required, less ram required.
35
What is real-time?
Sensors that detect inputs.
36
What is the purpose of Utility Software?
Maintains and organise a computer system. Performs extra functionality and housekeeping tasks.
37
What 6 things are involved in Utility software?
Encryption software Disk defragmentation Data compression Disk clean up tools Disk formatters Anti-virus software
38
What is Encryption software?
Encodes text so it can not be understood (can be read). Cypher key needed to decode it. Extra info: Padlock on sites show they are using HTTPS
39
How does Disk defragmentation work?
Reorganises files so they are stored together in consecutive memory locations. Fragmented files are not in consecutive memory locations so are slower to access. Defragmented disks are faster to read and free space is in one place. New files do not need to be fragmented. Defragmentation is only applicable to mechanical HDD as they having move parts only. SSD's have no moving parts.
40
How does data compression work?
Reduces ammount of storage space needed on a disk by reducing file size. Reduces amount of data sent. Allows attachments otherwise too large for file-size limit. More data can be stored on backup media.