Network Security Flashcards

(15 cards)

1
Q

Cyber Attack

A

Any kind of electronic attack on a computer system or other IT device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Social Engineering

A

Any kind of attack on a computer system or network that takes advantage of how people behave and respond to certain situations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Shoulder Surfing

A

Means gaining access to confidential information by directly observing a user, possibly looking over their shoulder

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Prevent Pharming

A

Check to see if the website address if the correct one.
Install latest security updates.
Install antivirus software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Eavesdropping

A

Means intercepting data being sent to/from another computer system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

2 types of code review

A

Review by another programmer
An automated review

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Modular testing

A

Testing each block of as it is completed to ensure the code works as expected

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Review by another programmer

A

Senior employee in writing code will look at the code produced so see if any bad coding practices or vulnerabilities are present

More labour intensive, more expensive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Automated review

A

Software that examines the code and highlight common vulnerabilities and bad coding practice

Can’t find every issue, fairly expensive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Audit trail

A

Record of activities that have taken place in a computer system

Makes it easy to figure out what happened during a cyber attack

Attack was successful what sections of the system were accessed and if data was copied or modified

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Ethical hacking

A

It is looking for weaknesses in a software and systems so they can be improved

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Penetration testing (Pen testing)

A

Where IT systems of a organization are deliberately attacked to find any weaknesses

Attacks are given authorization allowing it to be legal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Reviews of network and user polices should document

A

Who is authorized to carry out various activities on the network

How security is set up and maintained on the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

User policy contains

A

What use of the network is allowed or not allowed

How to report faults, problems and security issues

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Pharming

A

malware that hacks into DNS server changes the ip adress of corresponding domain name hence when user types domain name to the web browser the user gets directed to fake web page which acts like the real web page

How well did you know this?
1
Not at all
2
3
4
5
Perfectly