1.4.2 Identifying and preventing vulnerabilities

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/20

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

21 Terms

1
New cards

What does anti-malware software do?

Detects and removes malware such as viruses, worms, trojans and spyware

2
New cards

What happens when new malware is discovered?

It’s sent to the anti-malware company, verified, signature created, added to the database and updates are sent to computers

3
New cards

How is known malware handled?

It is automatically blocked or removed

4
New cards

Why are morphing viruses difficult to detect?

They change form to avoid signature-based detection

5
New cards

What is a firewall?

A system designed to prevent unauthorised access to or from a private network

6
New cards

What does a firewall separate?

A trusted network (like a LAN) from an untrusted network (usually the Internet)

7
New cards

How does a firewall check data?

It inspects data packets to see where they come from and where they’re going

8
New cards

What happens if a packet doesn’t match filtering rules?

It is dropped (called packet filtering)

9
New cards

What forms can firewalls come in?

Hardware (e.g. router) or software

10
New cards

How does a firewall detect malicious packets?

By monitoring OS access attempts, blocking known malicious IPs, and rejecting unrecognised or suspicious sources

11
New cards

What criteria does a firewall check?

Source address, type of traffic (e.g. .exe files) and specific website addresses

12
New cards

What are user access levels?

Permissions that control what data and different users can access in a system

13
New cards

Why are password policies used?

To ensure users create strong, secure passwords

14
New cards

What are common password policy requirements?

Minimum length, lowercase + uppercase symbols, regular password changes

15
New cards

What is encryption?

Turning data into unreadable form so it can only be understood with a key

16
New cards

What is an example of encryption use?

Websites store passwords in encrypted form, encrypted devices protect disk data

17
New cards

What is physical security?

Protecting hardware, software, and networks using physical measures

18
New cards

What are examples of physical security?

Security lighting, CCTV, intruder alarms

19
New cards

What is penetration testing?

Deliberately trying to find security weaknesses in your own systems

20
New cards

What are the goals of penetration testing?

Identify attack targets, find entry points, try to break in, and report findings

21
New cards

What does penetration testing not do?

It doesn’t fix or remove security threats

Explore top flashcards

Module 1
Updated 393d ago
flashcards Flashcards (102)
10/6
Updated 158d ago
flashcards Flashcards (62)
Business law exam
Updated 363d ago
flashcards Flashcards (100)
Sage Vantage Chp. 2
Updated 40d ago
flashcards Flashcards (56)
Unit 4 Vocab
Updated 1022d ago
flashcards Flashcards (40)
Module 1
Updated 393d ago
flashcards Flashcards (102)
10/6
Updated 158d ago
flashcards Flashcards (62)
Business law exam
Updated 363d ago
flashcards Flashcards (100)
Sage Vantage Chp. 2
Updated 40d ago
flashcards Flashcards (56)
Unit 4 Vocab
Updated 1022d ago
flashcards Flashcards (40)