Network Security Flashcards Preview

Computing 6 - Networks > Network Security > Flashcards

Flashcards in Network Security Deck (18):
1

why is no network completely immune to security threats

- because as organisations develop new security measures
- hackers develop new ways around them

2

what is the role of network security

to minimise the chances of unauthorised access

3

what is cyber security or network security

protecting computers from threats

4

how is good cyber security build from the ground up

- as code is being developed for any program
- it should be checked my multiple people
- code reviews can help to avoid the problems a code might have

5

what are the questions that should be asked when asking multiple people to check developing code in terms of its cyber security

- would it be possible for an outside user to abuse this code
- does it contain any vulnerabilities
- is the programmer leaving a back door for someone to enter the system later

6

what should a code be robust enough

to only provide data to those who are authorised to receive it

7

what does validation involve and how does it do this

- it involves checking the user is who they say they really are
- this can be done through a password or biometric measure

8

what does authentication involve and how does it do this

- it involves ensuring the user is entitled to access what they are trying to reach
- like you would not want a costumer to be able to view employee data
- but you want them to view their own account

9

why is useful to make sure that a human being rather than a machine is using the computer

because a lot of cyber attacks are carried out by computers and programs

10

what are the two examples of a system making sure that a human is using a computer rather than a computer and how does it work

- captcha
- where a blurry or difficult to read set of characters have to be entered
- or have a user verify an access attempt
- by having the user click on a link in an e mail

11

what is the effect of a software being installed in a system regarding hackers

- hackers have an opportunity to introduce viruses
- or attempt SQL injection attacks

12

what do security patches do and why are they made

- they protect against identified security threats
- developers create them to combat the hacking of software

13

why should someone download the most recent and most secure version of a program and anti malware software

because the most recent version is needed to deal with the most recent malware

14

what is ethical hacking or penetration testing

when an individual attempts to hack into a system with a view to identifying weaknesses

15

who do ethical hackers work with and what is their significance

- they work with software developers
- and their findings allow for the production of more secure programs

16

what are network forensics

using software to track the identities of anyone trying to access the system

17

what do network forensics allow us to do

- although they dont prevent the penetration of a software
- they allow for the perpetrators to be identified and caught
- which prevents future attacks

18

what is the low tech solution to cyber attacks

- the use of network and policy documents
- it spells out hat network users can and cant do
- and cover factors such as password complexity or a guidance on e mail attachments