4 - Network Security + System Software Flashcards
(40 cards)
What is Malware and give examples?
Malcious software. Executable programs that run on computer.
Examples: trojans, worms, viruses, ransomware
What is a Virus?
Replicates code onto other programs. Infects other computers and harms them by deleting, corrupting or modifying files.
What is a worm?
Replicates itself to spread to other computers. Causes no damage to attacked computer but slows it down.
What is a Trojan Horse?
File appears to be something user wants e.g. program, game or cracked file
Causes damage, takes control and provides access to computer
What is Ransomware?
Holds computer hostage by locking or encrypting access to it. Access is restored once ransom is paid.
What are the 8 ways of exploiting vulnerabilities?
Unpatched software
Out-of-data anti-malware
Social engineering
Shoulder surfing
Phishing
Denial of Service
Man in the Middle attack
SQL injection
How is Unpatched software exploited?
Vulnerable software as software and security updates have not been installed
How is out-of-date anti-malware exploited?
If anti-virus software isn’t regularly updated then it is unable to detect latest viruses.
What is Social engineering?
Ability to obtain confidential information by asking people for it.
What is shoulder surfing and give examples
Ability to get information or passwords by observing as someone types them in e.g. CCTV camera, looking over someone’s shoulder.
What is phishing?
A type of social engineering technique where messages are sent to users pretending to be banks/ websites. Try to get personal info e.g. passwords, credit card details e.t.c
What are the 6 signs of Phishing?
Greeting
Sender’s address
Forged link
Request for personal info
Sense of urgency
Poor spelling
What is Denial of service?
DOS - hacker uses/infects computer to flood server with requests. Server can’t respond fast enough and slows down or goes offline.
DDOS involves multiple computers
What is a Man in the middle attack?
MITM - attacker intercepts communications between user and server. Attacker eavesdrops to find personal details. Adds different info to a web page or email.
What is an SQL injection?
Structured query language - database query language which takes advantage of web input forms to access or destroy data.
Select From Where
What are the 7 ways of identifying and preventing vulnerabilities?
Penetration testing
Anti-malware software
Encryption
Firewalls
User access levels
Password policy
Physical Security
What is Penetration testing?
Delibarately trying to find security holes in your own systems.
Goals:
Identify targets of potential attacks
Idenitfy possible entry points
Attempt to break in
Report findings
What is Anti-malware software and how does it work?
Detects malware e.g. spyware.
Process: Malware detected –> antivirus company and malware is verified and a signature is created –> virus database and computter runs update
What is encryption and give examples of how it is used
Securing data so it cannot be understood without being decode with encryption key. (can still be read)
Storage and hard disk data is encrypted
HTTPS ( Secure hyper text transfer protocol)- encrypts connection to server.
Web browser send key and form data encrypted with server key. Server encrypts web page using web browser’s key. Individual files cna be encrypted with password.
What is a Firewall and how does it work?
Seperate trusted and untrusted networks (normally on the internet)
Data sent around in small packets. Packets checked for origin and destination. Packets not matching filtering rules are dropped. Can be run on dedicated hardware.
What are User access levels?
Access rights may be set on disks, folders and individual files.Only authorised users have access to and can edit particular files.
What is Password policy?
Passwords checked so they conform to parameters given in required policy e.g. length, numvers, letters and special characters.
What is physical security?
Physical methods of protecting hardware, software and networks.
Examples: CCTV, intruder alarms, locks, physical barriers and security guards.
What is operating system software and what 6 things does it provide?
Manages hardware, users and software resources.
Provides: User interface, Memory managment, Multi-tasking, Peripheral management, File management + User management.