1.4.2 Identifying and preventing vulnerabilities

5.0(1)
studied byStudied by 2 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/11

flashcard set

Earn XP

Last updated 9:23 AM on 7/20/25
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

12 Terms

1
New cards

What is penetration testing?

  • ethical hacking done to probe a network for any weaknesses so that they can be resolved

2
New cards

What are internal tests?

  • a penetration test done from within the network to see the damage that could be done by someone employed there

3
New cards

What are external tests?

  • white hat hackers try to infiltrate a compay network from the outside

4
New cards

What are blind tests?

  • done with no inside information to simulate what a real hacker would have to do to infiltrate the system

5
New cards

What are targeted tests?

  • conducted by the company’s IT department and the penetration team cooperating together to find faults in the system

6
New cards

What is the purpose of anti malware software?

  • to scan through all files on a computer and check them against a database of known malware

  • files with similar features to malware are detected

  • user alerted

  • can be deleted - virus cannot infect system

  • should be updated regularly so that it can detect the lastest threats

  • other roles of anti-malware software:

    • Checking all incoming and outgoing emails

    • Checking files as they are downloaded.

    • Scanning the hard drive for viruses and deleting them.

7
New cards

What is a firewall and its purpose?

  • to prevent unauthorised access to computers on a network

  • may run as software or be a dedicated unit built into the hardware

  • incoming/outgoing traffic is scanned by examining the source and destination addresses of packets

  • subject to filtering criteria which determine whether to allow or block packets. unauthorised packets are filtered out

  • can filter packets from certain IP addresses

  • can block access to certain ports

  • also used to - block access to insecure or malicious sites, blocking certain programs from accessing the internet, blocking unauthorised downloads, preventing specific users on the network from accessing certain files

8
New cards

What are the features of secure passwords?

  • minimise the chance of unauthorised users accessing a system

  • should be changed regularly

should contain

  • mix upper and lowercase letters

  • numbers

  • special characters

  • 8 characters or more

9
New cards

What do user access levels do?

  • determine the command / software a user has access to

  • users have restricted access

  • important to set access levels so that only authorised users can view and change data.

  • The more users who have access to a file, the more likely it is to be compromised.

10
New cards

How is encryption used?

  • scrambles data using an algorithm

  • websites may use HTTPS

  • individual file can be encrypted using a password

  • harder for attackers to understand the data when they intercept - data rendered useless

  • key needed to decrypt

11
New cards

What physical security can be implemented?

  • lock to prevent access to server rooms or locations that store confidential data. Only authorised personnel are given the key - prevents people inserting harmful devices into ports

  • Biometric entry to room

  • passcode entry to room

  • Other forms of physical security include keycards, security staff, CCTV cameras and alarms.

12
New cards

What are some acceptable use policies?

  • users should have secure passwords

  • users should not share passwords and change them regularly

  • users should not connect with unauthorised devices (e.g unfamiliar USB drives)

  • regular back up procedures

Explore top notes

note
How to write a thesis for AP lit
Updated 426d ago
0.0(0)
note
Chapter 4: States of Consciousness
Updated 1262d ago
0.0(0)
note
Ecce Romani ch. 1-12
Updated 1076d ago
0.0(0)
note
Earth's Spheres
Updated 1274d ago
0.0(0)
note
German Case Endings
Updated 549d ago
0.0(0)
note
Ethos, Pathos, Logos
Updated 1004d ago
0.0(0)
note
How to write a thesis for AP lit
Updated 426d ago
0.0(0)
note
Chapter 4: States of Consciousness
Updated 1262d ago
0.0(0)
note
Ecce Romani ch. 1-12
Updated 1076d ago
0.0(0)
note
Earth's Spheres
Updated 1274d ago
0.0(0)
note
German Case Endings
Updated 549d ago
0.0(0)
note
Ethos, Pathos, Logos
Updated 1004d ago
0.0(0)

Explore top flashcards

flashcards
patho exam 2
102
Updated 738d ago
0.0(0)
flashcards
AP Bio - Cell Cycle
28
Updated 1212d ago
0.0(0)
flashcards
HOSA intro to human body vocab
29
Updated 920d ago
0.0(0)
flashcards
Lektion 3: Essen und Zeit
100
Updated 1015d ago
0.0(0)
flashcards
Biology Final 2023
344
Updated 1025d ago
0.0(0)
flashcards
virtual relationships
24
Updated 468d ago
0.0(0)
flashcards
Patho exam 4
75
Updated 697d ago
0.0(0)
flashcards
AP Statistics Chapter 1 Review
27
Updated 871d ago
0.0(0)
flashcards
patho exam 2
102
Updated 738d ago
0.0(0)
flashcards
AP Bio - Cell Cycle
28
Updated 1212d ago
0.0(0)
flashcards
HOSA intro to human body vocab
29
Updated 920d ago
0.0(0)
flashcards
Lektion 3: Essen und Zeit
100
Updated 1015d ago
0.0(0)
flashcards
Biology Final 2023
344
Updated 1025d ago
0.0(0)
flashcards
virtual relationships
24
Updated 468d ago
0.0(0)
flashcards
Patho exam 4
75
Updated 697d ago
0.0(0)
flashcards
AP Statistics Chapter 1 Review
27
Updated 871d ago
0.0(0)