Unit 4:Network Security And System Software✔️ Flashcards

1
Q

What are the goals of penetration testing - “pen” testing

A

-identify targest of potential attacks
-identify entry points
-attempt to break in
-report back findings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does anti-malware software do?

A

Protects network /system agaist malware(trojans,virus,worms) Detects the malware reports it to anti-malware company -virus is confirmend and signature is created of the virus - added to database - users urged to update software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is encryption?

A

A way of secuing data so it cannot be read without an ecryption key
Change plain text to cipher text

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Encyrption of transmitted data?

A

Website use HTTPS(Secure Hypertext transfer protocol) encrypt the conection to the server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the purpose of encrypting drives ?

A

Prevents hackers from understanding the conent of the hard drive if removed or installed on a different computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a firewall

A

-seperates a trusted network from an untrusted network(normally the internet)
-packets entering are checked
-run on dedicated hardware or as software
-built into wifi routers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the job of the firewall?

A

Checks packets to see where they are coming from and going to for malcious content like viruse,trojans

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Firewall features?

A

-Prevents attackers gaining access to computers on network
-block packets from a certain ip address
-block inappropiate or malcious software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Issues with firewall?

A

-software firewalls slow down a computer
-dedicated hardware firewalls are expensive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are user access levels?

A

Controls which part of the network users can access and edit such as:internet,emails and software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is password policy?

A

Organisation and computer systems will often have password policy which determine what features the password must include.
Eg,numbers,8 letters ling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Physical security?

A

Where hardware,software and network are protecte by physical methods.
Examples:CCTV,alarms,locks,fenses,guards,id cards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is packet inspection?

A

When a firewall will look at data inside each packet to see if it contains mallicious content

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is malware?

A

Malware are executable programs that run on a compuer.
Example:virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What do viruses do?

A

-replecate their code in other programs
-infect other computers
-delet,corrupt and modify files
-need to be opened by human(not self replicating)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What do worms do?

A

-normally do not cause damage to computer
-might slow down network and computers
-replicate without human intervention

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What do trojans do?

A

Usually program,game or craked file user wants but contains code which causes damage,takes control or provides access to computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is ransomware?

A

-holds computer hostage-locks user out - encrypts access
-nearlly impossible to get data without backup
-once ransom paid access is restored

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is social ingineering?

A

Ability to obtain confidential information by appearing professional and secure/safe

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is shoulder surfing?

A

Ability to obtain information by observing someone as the type it it.
Eg:standing behind them,ussing cctv cameras

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is phishing?

A

-type of social engineering
-emails,text,phone calls send to user seem legit and try to get your password,usernames,credit card details

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is a denial of service attack(Dos)

A

-attacker sends many requests to server (known as a flood)
-sever can not respond fast enough so slow down or goes ofline

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is a distributed denial of sevice attack (DDoS) ?

A

Many computers are used to send requests and flood and server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is a Man-In-the-middle attack (MITM) ?

A

When a hacker is able to intercept communications between the user and server.
Can then eavesdrop to find passwords and personal info.
Easy to perform on unecrypted wifi

25
What is a brute fore attack?
Hacker will try every combination of the assword until correct password is found
26
What is an SQL injection?
Using web forms to add SQL instructions to cause data loss or the revealing of personal information
27
Function of an Operating system?
-user interface -memory management and multitasking -Periphreal managment and drivers -user managment -file managment
28
Examples of operating systems?
Windows,apple ios ,linux
29
What is system software?
System software is the software that provides a platform for other software to work.
30
What do operating sysetms do?
Manage computer hardware and resources used by software. Manage:user interface .... ext
31
What are user interfaces?
Provides a method for users to interact with a computer - example is graphical user interface(GUI)
32
Deskto interfaces?
-Windows -menus -icon -pointers
33
Types of user interface?
-menu-driven interface -command line inter face (CLI) -graphical user interface (GUI)
34
Pros of command line interface?
-requires little proccessing - can save money on graphics cards -faster than using a mouse -requires less hdd space -less ram needed
35
What is command line interface (CLI)
Text commands entered into interface
36
Where are menu-driven interfaces used ?
Menu-driven interface often used by devices that have a dedicated function eg ATM machine or MP3 player
37
What is multi-tasking?
Where an operating system manages many tasks at the same time. Eg web browser open while listening to music and messaging friends -OS decides which process will next run on the cpu and for how long
38
What are interrupts?
-Interrupts are signals sent to the cpu by external devices to indicate an event that needs immediate attention. -cpu suspens current activities to execute appropriate instructions
39
What are hardware interrupts?
Generated by hardware devices eg printer out of painter
40
What are software interupts?
Generated by programs eg 0 divided by 0 will generate an error message
41
What is peripheral managment?
-OS must manage inputs and send out outputs to devices -example of peripherals: mice,keyboard,webcam,microphone
42
What are devie drivers?
Device driver is a program that controls periphreal devices such as printer,mice and displays -each device communicates via its own driver
43
Hard disk?What peripheral are they?
-hard disk - storage peripheral-stores computers data,can be encrypted
44
File managment and the operating system?
-Manages where the disks files are written -keeps track of where they are so they can be retrieved -make sures the files are not overwritten
45
Features avaiable with file managment?
-naming files -moving file -saving files -deleting files
46
User managment?
Operating system is resonsible for password and user logins. -stores passwords in a database
47
What are Access rights?
-if a computer used by more the 1 person they should only see their files -users and system admins have different levels of access rights -some user may only be allowed to read files not edit them
48
What is utility software?
Utility programs perfrom extra functions and housekeeping jobs to help keep the computer functioning-often packaged as part of OS - example: antivirus software
49
Utility software example?
-encryption software -defragementation software -data compression -house keeping tools - disk clean up ext
50
What is encryprtion software?
Software used to encrypt sensetive data-changes plain text to cipher text - can not be understood without key
51
How to know if web browser is encrypted?
There is usually a padlock for sites that are using HTTPS
52
What does HTTPS stand for?
Hypertext transfer protocol secure
53
Organisations that use email encryption?
-companies sharing internal files -accuntant disscussing financial information -schools sharing info about students
54
What are encryption software utilities used for?
-encrypt storage on Hard drive - cant be understood if stolen -encrypt files on portable usb/removable storage -encrypt communication with websites
55
What is data decompression software?
Utilities like WInZip allow users to compress files/folders -reduce amount of space used on hard drive -reduces amount of data sent when sending files -more data can be stored on backup media
56
What does defragmenting the hard disk do?
Reorganises the files - they are stored together-reuces load times
57
Pros of defragmenting?
-read times are faster -free space in one location - new files dont need to be fragmented
58
What does it mean if a file is 'fragmented'
If you save a large file it might not fit on the disk in consequtive memory locations so it is split up.
59
Issues with 'fragmentin' files?
-drive head needs to moe to more locations to read file -slowe to access files/programs