Features of A Strong Password Flashcards

(28 cards)

1
Q

Features of a strong password

A
  • At least 8 characters
  • Mix of lower case, upper case, numbers and symbols
  • No guessable information such as names
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Purpose of a firewall

A
  • A piece of software (or hardware) that monitors incoming and
    outgoing signals
  • Can prevent unwanted incoming/outgoing signals
  • Can block transmissions from unwanted/unknown IP address
  • Can prevent hacking
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Description of user access levels

A

Giving people different permission, e.g. some people cannot read files, some people can read and not change files and some people have full access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Description of encryption

A
  • Jumbling up data … read without knowing the key to decrypt it, the data will not make sense
  • Prevents people understanding data if they intercept it
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Description and purpose of network forensics

A
  • Monitoring what is happening on a network,
    e. g what is being requested and transmitted
  • Analysing the data to find problems, illegal
    activities etc.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Examples of network policy

A
  • Strong passwords
  • Unable to download files from the Internet
  • Unable to access external media, e.g USB pen drive
  • Unable to Install software
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Definition of an SQL injection

A
  • Entering SQL statements into a text book on a website
  • When the form is submitted the query is executed by the database and
    returns data meeting the query
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Threats of a network

A
  • Virus/malware
  • Spyware
  • Hacker
  • People e.g shoulder surfing
  • Brute force attack
  • Data interception
  • Poor network policy
  • SQL injection
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Definition of a Virus

A
  • A piece of software
    • that can replace itself

*- that can cause damage to a computer system or
the data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How are people the ‘weak point’ in a system?

A
  • People’s carelessness can cause problems,
    e.g leaving a computer logged on, using
    weak passwords
  • People can perform malicious acts e.g shoulder
    surfing
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Definitions and examples of malware

A
  • Software designed to cause damage to a
    computer system/data
  • e.g virus (Trojan, worm spyware)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Importance of keeping data secure

A
  • Data is valuable and private; data needs
    protecting from being stolen and used for
    malicious needs
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Definition of a denial of service attack

A
  • Sofware is designed to make lots and lots of
    requests to a web server
  • The web server cannot take that many requests
    and the website goes down
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Purpose of network policies

A
  • Rules of governing the use of the network
  • Poor policy = rules for using the network that do
    not keep he data secure
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Description of penetration testing

A

Trying to gain unauthorised access into a system by all means in the order, to identify the weak points, so they can be fixed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Purpose of anti-malware software

A

When run, it scans a computer to find malware and either removes it or quarantines it

17
Q

Definition of data interception

A
  • A piece of software
  • …downloaded without knowledge
  • …that records keyboard presses
  • …that sends the data o a third party to
    analyse
18
Q

Definition of a brute force attack

A

Someone (or a computer) methodically tries to gain access to a computer system, e.g. by trying all password combinations

19
Q

Definition of spyware

A

Data is being transmitted somewhere, and someone (other than the intended recipient) accesses the transmission and reads t he data

20
Q

Purpose of network policies

A
  • Rules for governing the use of the network

* Poor policy=rules for using the network that do not keep the data secure

21
Q

Description of penetration testing

A

Trying to gain unauthorised access into a system by all means in order to identify the weak points so they can be fixed

22
Q

Purpose of anti-malware software

A

When run, it scans a computer to find malware and either removes it or quarantines it

23
Q

Definition of data interception

A
  • A piece of software
  • …downloaded without knowledge
  • …that records keyboard presses
  • …and sends the data to a third party to analyse
24
Q

Definition of a brute force attack

A

Someone(or a computer) methodically tries to gain access to a computer system, e.g. by trying all password combinations

25
Definition of spyware
Data is being transmitted somewhere, and someone other than the intended recipient accesses the transmission and reads the data
26
Purpose of antivirus software
* when run, it scans a computer to find viruses and either removes them or quarantines them * Scans download files for viruses; warning the user of any present
27
Definition of a hacker
A person who attempts to gain unauthorised access to a computer system
28
Purpose of anti-virus spyware software
* When run, it scans a computer to find spyware and either removes it or quarantines them * Scans downloaded files for spyware; warning the user of any present