Network Security Flashcards
(15 cards)
Cyber Attack
Any kind of electronic attack on a computer system or other IT device
Social Engineering
Any kind of attack on a computer system or network that takes advantage of how people behave and respond to certain situations
Shoulder Surfing
Means gaining access to confidential information by directly observing a user, possibly looking over their shoulder
Prevent Pharming
Check to see if the website address if the correct one.
Install latest security updates.
Install antivirus software
Eavesdropping
Means intercepting data being sent to/from another computer system
2 types of code review
Review by another programmer
An automated review
Modular testing
Testing each block of as it is completed to ensure the code works as expected
Review by another programmer
Senior employee in writing code will look at the code produced so see if any bad coding practices or vulnerabilities are present
More labour intensive, more expensive
Automated review
Software that examines the code and highlight common vulnerabilities and bad coding practice
Can’t find every issue, fairly expensive
Audit trail
Record of activities that have taken place in a computer system
Makes it easy to figure out what happened during a cyber attack
Attack was successful what sections of the system were accessed and if data was copied or modified
Ethical hacking
It is looking for weaknesses in a software and systems so they can be improved
Penetration testing (Pen testing)
Where IT systems of a organization are deliberately attacked to find any weaknesses
Attacks are given authorization allowing it to be legal
Reviews of network and user polices should document
Who is authorized to carry out various activities on the network
How security is set up and maintained on the network
User policy contains
What use of the network is allowed or not allowed
How to report faults, problems and security issues
Pharming
malware that hacks into DNS server changes the ip adress of corresponding domain name hence when user types domain name to the web browser the user gets directed to fake web page which acts like the real web page