Network Security (1.4) Flashcards

1
Q

What is a passive attack

A
  • monitoring data across network and intercepting any sensitive information they find (through the use of network monitoring hardware and software)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a active attack

A
  • Attacking a network with malware or other planned attacks
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is an insider attack

A
  • an insider who exploits their network to steal/expose information
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a brute force attack

A
  • Trying to gain access by using many password combinations (using automated software)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a denial of service attack (DoS)

A
  • Stopping users from accessing part of a network by flooding the network with many requests
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is malware

A
  • malicious software which causes damage (e.g. Editing/deleting files) when it is run
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is phishing

A
  • luring people into giving personal data through email/SMS messages sent from source that looks legitimate
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is pharming

A
  • redirects network traffic to a fake website which is intended to collect persona;/sensitive data
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is social engineering

A
  • the art of manipulating people into giving up their personal/sensitive data
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is data interception and theft

A
  • data sent to another device is intercepted by a 3rd party (unauthorised user)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the concept of SQL Injection

A
  • inserting malicious SQL statements into a database to edit/steal personal data
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is poor network policy

A
  • limited/no security rules to follow so easier for unauthorised users to gain access to data (e.g. no access rights, no back up of data etc)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are weak passwords

A
  • passwords that do not consist of upper/lower case characters, minimum length requirement, symbols and are not updated regularly
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is out of date software

A
  • software prone/not protected from the latest threats and malware
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is ransomware

A
  • prevents access to files and data unless a ransom is paid to the hacker/3rd party
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is penetration testing

A
  • testing the vulnerability of a network by paying authorised users (internal or external) to try and find weaknesses to exploit, and then fixing these to improve network security.
17
Q

What is physical security

A
  • having physical restrictions, such as ID cards, locks and keys to ensure sensitive data cannot be leaked/stolen
18
Q

What are network policies

A
  • having thorough sets of rules in place to reduce the chances of employees giving accidental or deliberate access to data
19
Q

What is anti-malware software

A
  • downloading an active program which protects data from malware by blocking malware from entering a system/network or finding and deleting/quarantining the malware to reduce impact
20
Q

What are Firewalls

A
  • monitors incoming and outgoing network traffic to protect against unauthorised connections to/from the internet
21
Q

What do user access levels do

A
  • granting different levels of access based on role in company to prevent access to sensitive/personal data
22
Q

What is a password

A
  • string of characters used to verify the identity of a person trying to gain access to a system/data (preventing unauthorised access)
23
Q

What is encryption

A
  • using algorithms to change the form of data sent across a network to make it difficult for unauthorised users to access or recognise, and can only access using the encryption key