Internet Security Flashcards

(19 cards)

1
Q

What are worms

A

Self-replicating pieces of software that spread through networks. Slow down the computer and use up internet bandwidth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are trojans

A

A malicious program that disguises itself as legitimate software. Can give access to the computer, allowing them to steal personal information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are viruses

A

Self-replicating and are spread through a host file or program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is phishing

A

Using an email to manipulate the victim into visiting a fake website and giving away personal information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is SQL injection

A

Where users enter SQL commands via online databases forms to change the processing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How can you minimise threats to the system

A

Anti-virus software
Up-to-date software
Improve code quality
Strong passwords
2FA
Firewalls or proxy servers
VPNs
Digital signature
Symmetric/asymmetric encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How does anti-virus software work

A

Will scan your computer for known malware and will quarantine the file if found

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does Up-to-date patches mean

A

Updates to the operating system and application programs to reduce vulnerabilities in the system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How does VPN work

A

Encrypts your internet making it harder for hackers to intercept your data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How does improving code quality help

A

Guard against buffer overflow attack
Guard against SQL injection attack
Use of strong passwords for login credentials
2FA
Use of access rights

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How does firewalls work

A

A firewall is a security system that monitors and controls incoming and outcoming traffic
It acts as a barrier between computer/network and internet.
Can be placed at the gateway
Can be configured to alert administrators of suspicious activity or
blocked attempts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How does stateful inspection work

A

In a firewall it will examine the payload of the packet instead of relying on port numbers and IP addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are proxy servers

A

Servers that act as an intermediary between the device and the internet. Hides the IP address, location,
It can filter content, cache and bypass restrictions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is symmetric encryption

A

Uses the same key to encrypt and decrypt
Uses key exchange to transfer the key between devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a man in the middle attack

A

An attacker only has to collect the key by sitting in the middle of the conversation and pretend to be the other party

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is asymmetric encryption

A

Uses two separate but related keys. Known as public/private key encryption.

17
Q

What is digital signature

A

Something that can verify the integrity of the message

18
Q

How does digital signature work

A

Sender creates digital signature:
1. Reduce the unencrypted message to produce a hash, then encrypt
the hash using their private key
2. The sender bundles the digital signature with the message and
encrypts the bundle using the recipient’s public key

Recipient receives the encrypted message:
1. Use own private key to decrypt bundle of digital signatures and
message
2. Uses sender’s public key to decrypt the message
3. Compares the hash received in message and their own hash to
verify

19
Q

What is digital certificate

A

Something used to verify the identity of the owner of each public key