Section Two and a Bit: Network Security Threats Flashcards
What is a passive attack?
Where someone monitors data travelling on a network and intercepts any sensitive information they find.
They use network-monitoring hardware and software such as packet sniffers.
Passive attacks are hard to detect as the hacker is quietly listening
How do you defend against passive attacks?
Data encryption
What is an active attack?
When someone attacks a network using malware or other planned attacks.
They are more easily detected than passive attacks
How do you defend against active attacks?
A firewall
What is an insider attack?
When someone within an organisation exploits their network access to steal information.
What is a brute force attack?
- A type of active attack used to gain information by cracking passwords through trial and error.
- They use automated software to produce hundreds of likely passwords combinations
- Hackers may try lots of passwords against one username or vice versa
How do you defend against brute force attacks?
Simple measures like locking accounts after a certain number of failed attempts and using strong passwords will reduce the risk of a brute force attack
What is a Denial of Service (DoS) attack?
Where a hacker tries to stop users from accessing a part of a network or website
Most DoS attacks involve flooding the network with useless traffic, making the network extremely slow or completely inaccessible
What is malware?
Malicious Software
Installed on someone’s device without their knowledge or consent that can harm their device
What are some of the typical actions of malware?
- Deleting or modifying files
- Scareware
- Locking files
- Spyware
- Rootkits
- Opening backdoors
What is scareware?
E.g. It tells the user that their computer is infected with lots of viruses to scare them into following malicious links or paying for problems to be fixed.
What happens when a hacker locks files?
Ransomware encrypts all the files on a computer. The user receives a message demanding a large sum of money to be paid in exchange for a decryption key
What is spyware?
It secretly monitors user actions, e.g. key presses, and sends info to the hacker
What are rootkits?
Rootkits alter permissions, giving malware and hackers administrator-level access to devices
What does it mean to open backdoors?
Making holes in someone’s security which can be used for future attacks
How can malware access a device?
Viruses
Worms
Trojans
Viruses
Attach to certain files, e.g. .exe files and autorun scripts. Users spread them by copying infected files and activate them by opening infected files
Worms
Like viruses but they self-replicate without any user help, meaning they can spread very quickly. They exploit weaknesses in network security
Trojans
Malware disguised as legitimate software. Unlike viruses and worms, Trojans don’t replicate themselves - users install them not realising they have a hidden purpose.
What is a network policy?
A set of rules and procedures the organisation will follow to ensure their network is protected against attacks and unauthorised access
A good network policy will…
- Regularly test the network to find and fix security weaknesses and investigate any problems
- Use passwords to prevent unauthorised people from accessing the network
- Enforce user access levels to limit the number of people with access to sensitive information
- Install anti-malware and firewall software to prevent and destroy malicious software attacks.
- Encrypt sensitive data
What is penetration testing?
When organisations employ specialists to simulate potential attacks on their network
Pentesting is used to identify possible weaknesses in a network’s security by trying to exploit them. The results of the pentest are then reported back
What are network forensics?
- Network forensics are investigations undertaken to find the cause of attacks on a network. To conduct network forensics, an organisation needs to have a system of capturing data packets as they enter their network.
- After the network is attacked, these packets can be analysed to discover how the network was attacked and decide how to prevent future attacks
Passwords
- Passwords help prevent unauthorised users accessing the network
- Passwords should be strong - they should be many characters long, use a combination of letters, numbers and symbols - and be changed regularly