4 - Network Security

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/45

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

46 Terms

1
New cards

List the main 6 forms of attack on networks (6) DDSSMB

- Malware

- Social engineering

- Brute-force attacks

- Denial of Service attacks -

- Data interception and theft

- SQL injection

2
New cards

State three types of malware (3)

- Viruses - Trojans - Worms - Ransomware - Spyware - Scareware

3
New cards

Describe how malware harms a computer. (4)

- Files deleted, corrupted or encrypted - Comps. crash, spontaneously reboot & slow down. - Internet conns. slower - Keylogging - inputs e.g. passwords logged + sent to hackers

4
New cards

What is a computer virus? (1)

A virus is a program that is installed on your computer designed to replicate itself.

5
New cards

How could a virus spread?

Across devices on a network or through shared files

6
New cards

What is a trojan? (1)

A program that seems to have a useful & specific purpose but it essentially infects the device without the user noticing at the beginning.

7
New cards

How is a trojan usually transferred? (1)

Via email

8
New cards

What are worms? What damages do they cause? (2)

Standalone program that infects a device without having to corrupt other programs. They might cause no damage to the attacked computers, but they slow down networks and computers

9
New cards

What makes worms dangerous? (2)

Worms are able to spread across networks without having to share the host/infected files like viruses.

10
New cards

What is social engineering? (1)

- the ability to obtain confidential information by asking people for it.

11
New cards

List 3 social engineering methods that attackers commonly use (3)

1- Phishing 2- Blagging 3- Human error (human as a 'weak' point)

12
New cards

What is phishing? (4)

- Fraudulent practice of sending emails - disguised as trustworthy source - to trick users into revealing personal info - e.g. passwords & credit card details

13
New cards

Describe how phishing harms a user & a company. (4)

User: - Hacker accesses victim's bank acc. to withdraw & spend money - Via cashing illegitimate cheques or buying services Company: - Hacker gains access to high-value corporate data - Financial services can blacklist company, damaging rep

14
New cards

Identify 5 ways how people can be 'the weak point' in the system. (5)

- Not updating anti-malware - Not logging off comp. - Not encrypting data - Leaving printouts with sensitive info around - Sharing passwords

15
New cards

What is blagging? (2)

Dishonestly persuading someone to divulge personal or sensitive information by deception.

16
New cards

What are brute-force attacks? (2)

- Automated or manual attempts to gain unauthorised access to secure areas by trying all possible password or key combinations.

17
New cards

What is a DoS attack? (1)

Servers and devices are flooded with too many requests or packets, causing them to crash or become unusable.

18
New cards

How could a DoS attack be harmful? (2)

- Decreases reputation of a website due to a lack of reliable performance - Loss of revenue, as the service is inaccessible

19
New cards

List three forms of data interception and theft (3) SUM

- Shouldering - Using an unlocked device of another user (Exploiting vulnerabilities) - Man-in-the-middle attack

20
New cards

What is meant by shouldering? (2)

Literally looking over one's shoulder to look at their password/pin

21
New cards

Describe a man-in-the-middle attack? (2)

- Secretly intercepting a conversation (transmission) to obtain information - Might involve modifying the communications as well in some cases

22
New cards

What is the concept of an SQL injection? (1)

Inserting malicious code into an input (database) field on a website/program

23
New cards

What are 7 common prevention methods? (7) PPPFEAU

1- Penetration testing 2- Anti-malware software 3- Firewall 4- User access levels 5- Passwords 6- Encryption 7- Physical security

24
New cards

Why is penetration testing useful? (1)

Because it helps to identify potential weaknesses in a system

25
New cards

How is penetration testing performed? (4)

- Gather info about possible targets - Locate potential entry points - Attempt to hack in (ethical hacking) - Report results/conclusions

26
New cards

What is the difference between an internal and an external test? (2)

- Internal: checking how much damage an actual employee could cause - External: Targeting email server, webservers and firewalls

27
New cards

What is the funciton of anti-malware software?

To detect, prevent, and remove malicious software from devices.

28
New cards

What are firewalls used for?

Firewalls are used to monitor and control incoming and outgoing network traffic based on predetermined security rules. They serve as a barrier between trusted internal networks and untrusted external networks, protecting systems from unauthorized access and threats.

29
New cards

How can user access levels be considered a prevention method? (2)

Setting appropriate access levels for users depending on their position ensures they do not access data that they don't require.

30
New cards

How could passwords be a method of prevention? (2)

Passwords should not be shared, or stored in an easily accessible location. - Shouldn't be a commonly used password or easy to guess.

31
New cards

Explain the advantage of encrypting data (1)

Only allows users with the key to access the encrypted files

32
New cards

A method of prevention is physical security, explain what this means. (2)

Physical security could be a method of prevention as it limits physical means to obtaining information/ hardware or infecting systems (e.g. locks on doors, server cabinets, security guards)

33
New cards

What is malware. (1)

malicious software - an executable program or piece of code that is designed to cause damage or gain unauthorised access.

34
New cards

What is ransomware? (2)

Ransomware is software which holds a computer hostage by locking or encrypting access to it. Once a ransom is paid to the attacker, access is restored.

35
New cards

Give one advantage and disadvantage of penetration testing? (2)

disadvantage - Can be expensive, and unethical

- gives external people access (potentially untrustworthy),

advantage - but professionals more effective than network managers,

- and much less likely to cause damage when done by a professional.

36
New cards

How can phishing be prevented? (1)

Network policy/firewall/user awareness

37
New cards

How can brute-force attacks be prevented? (1)

Strong passwords with limited attempts/penetration testing

38
New cards

How can shoulder surfing be prevented? (1)

Concealing password/PIN entry, user awareness, access levels.

39
New cards

How can Interception or data theft be prevented? (1)

encryption/biometrics/physical locks

40
New cards

How can Exploiting vulnerabilities be prevented? (1)

Consistent security updates and OS updates to the computer, and penetration testing

41
New cards

A library has several computers available to the general public. Explain why the libraries need the following security measures: (4) i. User access levels ii. Firewalls

i. Different users only have permissions to files/areas/services of the network which they actually need (eg the public should only be able to search eg only employees should issue books eg only managers can look at pay records.) To prevent malicious or accidental corruption of parts of the network. ii. Stops all access to/from the WAN unless it has been authorised Eg requests from other libraries. Prevents hackers from compromising the system.

42
New cards

What is a firewall?

A firewall is a network security device that monitors and controls incoming and outgoing network traffic based on predetermined security rules.

43
New cards

What is the funciton of user access levels? (3)

User access levels define permissions for different users within a network, ensuring they can only access necessary resources, thereby enhancing security and minimizing risks of unauthorized access.

44
New cards

What is a firewall?

A firewall is a network security device that monitors and controls incoming and outgoing network traffic based on predetermined security rules.

45
New cards

What is a computer worm? (1)

A standalone malicious program that can replicate itself to spread across networks without needing to corrupt other files.

46
New cards

What is the function of encryption software? (3)

Encryption software is used to convert data into a format that cannot be read by unauthorized users. It protects sensitive information by encoding it so that only those with the decryption key can access it.