1.4.2 Identifying and preventing vulnerabilities

studied byStudied by 0 people
0.0(0)
learn
LearnA personalized and smart learning plan
exam
Practice TestTake a test on your terms and definitions
spaced repetition
Spaced RepetitionScientifically backed study method
heart puzzle
Matching GameHow quick can you match all your cards?
flashcards
FlashcardsStudy terms and definitions

1 / 11

flashcard set

Earn XP

Description and Tags

12 Terms

1

What is penetration testing?

  • ethical hacking done to probe a network for any risks or weknesses so that they can be resolved

New cards
2

What are internal tests?

  • a penetration test done from within the network to see the damage that could be done by someone with a registered company account

New cards
3

What are external tests?

  • white hat hackers infiltrate a compay from the outside

New cards
4

What are blind tests?

  • done with no inside information to simulate what a real hacker would have to do to infiltrate the system

New cards
5

What are targeted tests?

  • conducted by the company’s IT department and the penetration team cooperating together to find faults in the system

New cards
6

What is the purpose of anti malware software?

  • to scan through all files on a computer and check them against a database of known malware

  • files with similar features to malware are detected and deleted

  • software should be updated regularly so that it can detect the lastest threats

  • other roles of anti-malware software:

    • Checking all incoming and outgoing emails and their attachments.

    • Checking files as they are downloaded.

    • Scanning the hard drive for viruses and deleting them.

New cards
7

What is a firewall and its purpose?

  • a tool to seperate a trusted network from an untrusted network (usually the internet)

  • may run as software or be a dedicated unit built into the hardware

  • all incoming/outgoing traffic is scanned by examining the source and destination addresses of packets

  • packets are subject to filtering criteria which determine whether to allow or block packets. unathorised packets are filtered out

capabilities

  • can filter packets from certain IP addresses

  • can prevent access to certain ports on the network

roles

  • to prevent unauthorised access to computers on a network

  • also used to - block access to insecure or malicious sites, blocking certain programs from accessing the internet, blocking unauthorised downloads, preventing specific users on the network from accessing certain files

New cards
8

What are the features of secure passwords?

  • minimise the chance of unauthorised users accessing a system

  • should be changed regularly

should contain

  • mix upper and lowercase letters

  • numbers

  • special characters

  • 8 characters or more

New cards
9

What do user access levels do?

  • determine the facilities a user has access to

  • important to set access levels so that only authorised users can view and change data.

  • The more users who have access to a file, the more likely it is to be compromised.

New cards
10

How is encryption used?

  • websites may use HTTPS

  • individual file can be encrypted using a password

  • harder for attackers to understand the data when they intercept

New cards
11

What physical security can be implemented?

  • lock to prevent access to server rooms or locations that store confidential data. Only authorised personnel are given the key.

  • Biometric entry to room

  • passcode entry to room

  • Other forms of physical security include keycards, security staff, CCTV cameras and alarms.

New cards
12

What are some acceptable use policies?

  • users should have secure passwords

  • users should not share passwords and change them regularly

  • users should not connect with unauthorised devices (e.g unfamiliar USB drives)

  • regular back up procedures

New cards

Explore top notes

note Note
studied byStudied by 11 people
980 days ago
5.0(1)
note Note
studied byStudied by 39 people
956 days ago
5.0(3)
note Note
studied byStudied by 7 people
398 days ago
5.0(1)
note Note
studied byStudied by 17 people
853 days ago
5.0(1)
note Note
studied byStudied by 11338 people
656 days ago
4.6(36)
note Note
studied byStudied by 116 people
488 days ago
5.0(1)
note Note
studied byStudied by 30 people
700 days ago
5.0(1)
note Note
studied byStudied by 20 people
828 days ago
5.0(1)

Explore top flashcards

flashcards Flashcard (83)
studied byStudied by 57 people
770 days ago
5.0(2)
flashcards Flashcard (40)
studied byStudied by 10 people
728 days ago
5.0(1)
flashcards Flashcard (40)
studied byStudied by 2 people
607 days ago
5.0(2)
flashcards Flashcard (59)
studied byStudied by 46 people
273 days ago
5.0(1)
flashcards Flashcard (54)
studied byStudied by 14 people
422 days ago
5.0(1)
flashcards Flashcard (71)
studied byStudied by 35 people
493 days ago
5.0(1)
flashcards Flashcard (352)
studied byStudied by 46 people
399 days ago
5.0(1)
flashcards Flashcard (114)
studied byStudied by 2 people
16 minutes ago
5.0(1)
robot