Unit 4 - Network Security Flashcards

(30 cards)

1
Q

What is malware

A

Malware is any software intenionally designed to cause damage to a computer,server,client or computer network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the 7 types of malware ?

A

Trojans,spyware,adware,rookits,ransomware,worms,keyloggers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the malware virus ?

A

They replicate their code in other programs

They infect other computers

Theu harm the computer by delecting corrupting or modifying files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What malware is a worm

A

A worm replicates its self in order to spread to other computer.
They slow down networks and computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a trojan horse ?

A

They have a program that the user wants. However they also have a negative code that can then cause damage,take control,provides access to the computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is ransomware ?

A

Holds a computer hostage by locking or encrypting access to it.
If the data is encrypted not even a cyber security professional can recover it. Once the ransom is paid to the attacker access is restored

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a brute force attack

A

A hacker will try every combination or password until the correct answer is found

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does SQL stand for?

A

Structured query language

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is an sql injection ?

A

Takes advantage of web inputs forms to access or deystroy data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is social engineering ?

A

Deception to gain personal information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is denial of service attacks ?

A

Flooding a server or network with pointless requests so that is fails or slow down

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is data interpretation and theft ?

A

Stealing data or intercepting it with a man-in-the-middle attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Name 4 common preventation methods

A
penetration testing
• anti-malware software – including anti-virus software
• firewalls
• user access levels
• passwords
• encryption
• physical security
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is penetration testing ?

A

Is the practice of deliberately trying to find security holes in your own system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is anti malware software ?

A

Anti-malware software will detect malware such as viruses, worms, trojans, and spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is encryption ?

A

Encryption is a way of securing data so that it cannot be read without the encryption key

17
Q

What are firewalls

A

is a network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules

18
Q

What are user access levels

A

They are set by an admin. On how much a user can edit or see of a disk,folder and indivdual files

19
Q

What are Password policys?

A
chosen password has features like
• Minimum length of characters
• Include at least one lowercase letter
• Include at least one uppercase letter
• Include at least one symbol
• Change password every month
20
Q

What is physical security

A

hardware, software and networks are protected by physical methods

21
Q

Name 4 examples of physical security ?

A
  • CCTV
  • Intruder alarms
  • Locks on doors or cabinets
  • Fences, walls, barbed wire
  • Security guards
  • ID cards and signs
  • Turnstiles and gates
22
Q

What are operating systems

A

Manage computer hardware, users and the resources used by the software.
Example multitasking, user managment, file managment

23
Q

What are graphical user interfaces

A

Pointers, icons, menu, drag and drop, windows

24
Q

What are the different types of user interfaces ?

A

Graphical user interfaces, command line interface, menu -driven interface

25
What are interrupts
Are signals sent to the cpu by external devices to indicate an event that needs immidediate attention
26
What is the difference between hardware and software interrupts
Hardware - generate by hardware devises. Printer out of paper Software - are generate by programs. A wrong password will cause an error message
27
What are the forms of network attacks?
``` Passive Active Insider Brute force Denial of service ```
28
What is a passive attack
monitoring data across network and intercepting any sensitive information they find (through the use of network monitoring hardware and software
29
What is an active attack
attacking a network with malware or other planned attacks
30
What is a brute force attack
trying to gain access by using many password combinations