U9 - NETWORK SECURITY Flashcards

(34 cards)

1
Q

RISKS TO DATA

A

HUMAN ERROR
HACKING
VIRUSES
TECHNICAL BREAKDOWNS
INTERCEPTION
OLD DEVICES
PHYSICAL THEFT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

INTERCEPTION

A

Data can be intercepted and altered when sent across a network
PACKET SNIFFING is when packets sent across a network are monitored

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

DISCARDED COMPONENTS

A

Old devices can contain data unless FACTORY RESET or SIM REMOVED

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

HACKING

A

Gaining unauthorised access to a computer system
White / Grey / Black Hat hacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

THREE WAYS OF BEING SECURE BY DESIGN

A

Buffer Overflow
Too many permissions
Parameters in functions with no validation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

BUFFER OVERFLOW

A

When a program tries to store more data in a buffer than was intended.
Can occur intentionally in a buffer overflow attack
Can be combatted by BOUNDS TESTING, ensures data enteredis within acceptable limits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

TOO MANY PERMISSIONS

A

Too many users have access to sensitive files. Constantly reviewing permissions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

PARAMETERS IN FUNCTIONS WITH NO VALIDATION

A

Malicious code can be embedded within input bars on webpages.
This occurs when code is entered into functions with no validation.
Vaildation ensures data is as expected.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

NAME THE THREE WAYS OF PROTECTING DATA

A

ACCESS LEVELS
PASSWORDS
ENCRYPTION (XOR)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

ACCESS LEVELS

A

Not all users have access to all data
Only relevant parties have read/write access to files to minimise security risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

PASSWORDS

A

Passwords should be strong
Containing various different character types
Weak passwords are easier to brute force
No birthdays or names

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

ENCRYPTION

A

Data should be SCRAMBLED before being sent across a network
CYPHERTEXT cannot be understood without an ENCRYPTION KEY
XOR encryption - XOR the data with the data key to scramble

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

TWO WAYS TO IDENTIFY VULNERABILITIES

A

FOOTPRINTING
PENETRATION TESTING

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

FOOTPRINTING

A

Checking what information is available about a company and its servers online
Helps to remove and identify infromation that can aid hackers exploit there target

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

PENETRATION TESTING

A

A form of ethical hacking
A system breach is attempted in order to highlight security flaws
This means the vulnerabilties can be removed before a hacker exploits them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

NAME 5 FORMS OF CYBER ATTACK

A

SQL INJECTION
DoS ATTACK
BRUTE FORCE ATTACK
IP SPOOFING
SOCIAL ENGINEERING

17
Q

SQL INJECTION

A

Structured Query Language
Malicious code is injected into search bars/ forms to compromise the security of information

18
Q

DoS ATTACK

A

Denial of Service Attack
Flooding the network with meaningless requests in order to make it crash

19
Q

BRUTE FORCE ATTACK

A

Working through all the possible combinations in order to crack a password

20
Q

IP SPOOFING

A

Changing the IP of a legitimate website so that if a user types in the address they are taken to a fake webpage where the hacker can steal sensitive information.

21
Q

SOCIAL ENGINEERING

A

Phishing is a form of social engineering
Using people as the vulnerability
Manipulating people into giving away sensitive information

22
Q

NAME 4 TYPES OF MALWARE

A

VIRUSES
WORMS
TROJANS
KEYLOGGERS & SPYWARE

23
Q

VIRUSES

A

Programs that can REPLICATE themselves abd spread across a system
Must attach itself to a HOST FILE

24
Q

WORMS

A

SELF-REPLICATING programs that identify vulnerabilities in the OS
Enable REMOTE CONTROL of the infected computer

25
SPYWARE & KEYLOGGERS
Spyware is accidentally downloaded and then COLLECTS DATA without the user's knowledge Keyloggers record key strokes to log passwords and account numbers
26
TROJANS
Programs that appear legitimate but provide a backdoor for hackers to steal data from
27
NAME 4 WAYS OF KEEPING A NETWORK SECURE
TWO-FACTOR AUTHENTICATION UP TO DATE SOFTWARE ANTIVIRUS FIREWALLS
28
TWO-FACTOR AUTHENTICATION
An extra securtiy measure The user is required to identify themselves twice i.e. a code sent to an email address
29
UP TO DATE SOFTWARE
Having the latest OS means the best security Updates remove vulnerabilities
30
FIREWALLS
A firewall is software that monitors outgoing and inbound network traffic. Data packets are analysed for malicious code before being allowed onto the network
31
ANTIVIRUS SOFTWARE
Scans data on the network flagging potential threats Anti-virus software automatically scans and deletes malicious software Antivirus needs to be routinely updated against new security threats
32
COOKIES
Small pieces of data given by a website and stored on the user's device Used to identify a user and give personalised webpages, targeted ads and automatic login Used to track visitors to a webpage Tracking cookies can reveal search history privacy breach
33
ACCEPTABLE USE POLICY
Terms which an employee must adhere to when on a company computer system i.e. no obscene material, no gambling, malicious activity
34
DISASTER RECOVERY POLICY
Policies set out in the event of a catastrophic data loss Details where backups can be found, how employees should work in the meantime, steps to recover data