Computer And Networks Security Flashcards

1
Q

Firewall

A

Barrier between internal network and Internet or untrusted networks.

Prevents unauthorised access and protect from types of cyberthreats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Virus

A

Infects some executable software which causes that software to spread the virus.

Contain payload which performs other malicious actions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Worm

A

Self replicate and actively transmit itself over a network to infect other computers.

They do not need to attach themselves to an existing program.

Harm to networks by consuming bandwidth.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Spyware

A

Collects small amounts of data about users without their knowledge.

Slow computers by reporting internet surfing habits, changing settings, installing additional software, and redirecting web browsers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Adware

A

Automatically displays or download ads to computer.

Usually integrated with spyware and displays ads related from spying.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Phishing

A

Attempting to acquire sensitive information such as usernames, passwords, bank account info’s by masquerading as a trustworthy entity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Social engineering

A

Act of manipulating people into performing actions or divulging confidential information rather than by breaking in or using technical vulnerabilities.

Leads to data breaches, unauthorized access, and financial loss.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How to protect computer from attacks

A

Keep software up to date, use antivirus software.

Use strong passwords, unique one and never reuse them.

Install and maintain firewalls helps block unauthorized access to network.

Use encryption to make data unreadable to unauthorized parties.

Implement access controls to ensure only authorized users access your network.

Regularly back up data to recover it in case of cyberattacks or disaster.

Use 2 step verification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

3 functions of antivirus software

A

Scan and Detection

Removal and Quarantine

Real time Protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Describe how malware can affect a system’s reliability and performance.

A

System crash

Sluggish performance

Reduced storage capacity

Network congestion

System instability

Data loss

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

BIOMETRIC SYSTEMS

A

verify or recognize identity of a person based on their unique physical or behavioral characteristics, such as fingerprints, facial recognition, iris/retina scans, voice recognition, or DNA analysis.
Used for security purposes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Describe THREE characteristics of biometric security systems

A

Uniqueness: rely on unique biological or behavioral characteristics specific to each individual.

Accuracy: measured in terms of False Acceptance Rate (FAR) and False Rejection Rate (FRR).

Security: more secure than passwords or PINs, because biometric traits cannot be easily replicated or stolen.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Advantages of biometric systems

A

High security, harder to gain access.

Convenient and fast way for users to authenticate their identity without remembering passwords or carry identification cards.

More accurate and easy to use.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Disadvantages of biometric systems

A

Costly to implement and maintain due to required hardware, software, and infrastructure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Cybersecurity

A

Monitor and protect against online attacks.
Ex: hacking, snooping, phishing, online spying.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Hacking

A

Someone who seeks to breach defenses and exploit weaknesses in computer system or network.

17
Q

Ransomware

A

Denies you access to your files or computer until you pay a ransom.

18
Q

Spam

A

Untrusted bulk email,electronic equivalent of junk email that comes to your inbox.

Spam uses bandwidth and fills up databases.

19
Q

Discuss three different methods of authenticating a user at the point of login

A

Knowledge-Based Authentication:
uses information you know, like a password or PIN, to verify your identity. It’s common but can be tricked by hackers using fake messages or guessing.

Possession-Based Authentication:
uses something you have, like a code sent to your phone, to prove it’s really you. It makes things safer but can be risky if you lose your phone or someone steals it.

Biometric Authentication:
* Utilizes unique biological traits like fingerprint, facial recognition, iris scanning.
* Difficult to replicate, may face challenges like false positives or environmental factors.

20
Q

3 threats against computer network from external attackers

A

Malware attacks

Distributed denial of services attacks.

Social engineering attacks

21
Q

Trojan Horse

A

Pretends to be legitimate software.
Actually, carry out hidden harmful functions.

22
Q

Access Control List

A

Used in operating systems, network, other security systems

Ensure only authorized users or systems can access sensitive resources, such as files or network

23
Q

What is malware ?

A

Malware, including viruses, worms, ransomware, spyware, and adware, is software designed to cause damage to computers, servers, networks, or devices, stealing data or disrupting operations.

24
Q

Denial of Service (DOS)

A

Malicious attack that disrupts a network, website, or service by flooding a server with traffic, causing service disruption and potential financial loss.

Malicious attack floods a server with traffic, disrupting service and causing potential financial loss.

25
Pop up blocker
Prevents automatic pop-up windows or ads on user's screen. Blocks code triggering pop-up windows or filtering URLs/scripts. Modern web browsers have in built pop-up blocker.
26
Anti Spyware
Detect and remove spyware automatically or prompt user to do so. Provide real-time protection, maintain security and privacy.
27
Man-in-the-Middle (MITM)
A hacker secretly listens to or changes messages between two people. This can steal or mess up private info. For example, someone spy on an unprotected email.
28
Sniffing
watching and analyzing internet traffic to steal private info. It can lead to data theft and privacy problems. For example, use tool to grab login details from a Wi-Fi network.
29
Scanning
checking a network to see what devices, ports, services are active. Hackers use it to find weak spots they can attack later. For example, use tool to spot open ports on server.