Internet Security Flashcards

(14 cards)

1
Q

What is a firewall?

A

Hardware and or software for protecting against unauthorised access to a network acting as a barrier

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are two types of firewalls?

A

Hardware (physical devices)
Software(programs running on computers)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How does a firewall use packet filtering to protect a network?

A

Examines header information of each data packet coming in or out of a network and deciding whether to allow it or clock the packet based on predefined rules.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How does a firewall use Stateful Inspection to protect a network?

A

It monitors active network connections to identify and block threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How does a firewall use ports to protect a network?

A

It controls whether or not a program can access or be accessed by your computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How does a firewall use IP addresses to protect a network?

A

It identifies the source and destination of network traffic allowing it to filter incoming and outgoing data based on predefined rules

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a proxy server?

A

A computer or device which allows connection between a user and internet e.g when you request a website the proxy server makes the request on your behalf and send the information back to you

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How does a proxy server protect a network or device?

A

-Hides IP address
-Content filtering
-Caching
-Blocks dangerous Websites
-Tracks internet Usage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is encryption?

A

Uses an algorithm to convert a message into a form that is not understandable without the key to decrypt it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is symmetric encryption?

A

The same key is used to encrypt and decrypt a message, less security and hard to send key without interception

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is asymmetric encryption?

A

The sender uses the public key to encrypt it and receiver uses their private key to decrypt it, slower than symmetric encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a digital certificate?

A

An electronic document that proves the identity of a person, website or organisation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are key components of a digital certificate?

A

Public key-Used for encrypting and verifying digital signatures
Owner Information
Issuer information-the CA that issued certificate
Expiration date-validity period of certificate
Digital signatures Owner-a cyptographic signature from CA verifying identity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How do you produce a digital signatures?

A

-Message is hashed into a message digest(a hash) which is encrypted with senders private key
-Digest calculated from message which is a shortened value calculated from the message
This is transmitted with the message
Receiver would check certificate authority’s public key before decrypted using public key
Hashing function applied to text of message
The result is compared with digital signatures Owner Information
If same it is the digital signature

How well did you know this?
1
Not at all
2
3
4
5
Perfectly