Network security Flashcards

1
Q

Whats are the forms of attack

A

Active - A Hacker attempts to delete/modify data or prevent a network from operating correctly

Passive - Hacker monitors a network to gain information

External - Someone outside of the organisation tries to hack the network

Internal - Someone inside the network tries to hack the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Name some threats to Networks

A

Malware
Phishing
brute force
Denial of service (DOS)
data interception/theft
Structured query language injection
poor network policy
people

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Name the 5 types of malware and what they do

A

Viruses - programs are hidden within other files the replicate to become a part of other programs they cause damage by deleting/modifying data

Worms - Similar to viruses but not hidden in files they often spread through emails

Trojans - Programs that pretend to be legitimate but malware they trick the user into installing the program

Spyware - Monitors user activities and sends information to hacker

Ransomware - Programs that blackmail the user to pay a ransom like encrypting documents and encrypting them after they have paid

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How does phishing work

A

Tries to trick the user into giving away details they pretend to be genuine (Like a fake roblox website telling you to type in your password)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How does Brute force work

A

A program tries to crack a password using all possible combinations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Denial of service

A

A computer or many computer bombards a web server with many requests so that the web focuses on the DOS request leaving the legitimate ones

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Data interception and theft

A

A packet sniffer examines data and send information to the hacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

how does Structured query language work

A

SQL code is entered as data input this causes errors and unintended operations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Poor network policy

A

Rules to prevent users form doing certain actions that could harm the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

People

A

Users may accidentally or deliberate download programs when they are not meant to and the program may contain potential threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the 8 techniques to identify and prevent vulnerabilities/threats name what some do

A

Penetration testing
Network forensics
Network policies
User access levels
Secure passwords
Encryption - even if the hacker has the data it is disguised so he wont know what it means
anti-malware software - detects prevents and removes malware but if not up to date it is vulnerable to newer malware
firewalls - Blocks unauthorised connections to and from the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is penetration testing

A

The system is tested to find any vulnerabilities in a network this can be done using a software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How does a secure password prevent threats

A

Without knowing the password you are unable to access the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How does having a network policy prevent threats

A

Having a set of rules lets the users know what they can and cannot do like downloading thing that might have malware and if they break them they can be dealt with

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How does user access levels prevent threats

A

If a user is restricted in access they cannot perform certain tasks such as downloading if one cannot download it removes the possibility of them downloading malware