1.4.2 Identifying and preventing vulnerabilities

studied byStudied by 0 people
0.0(0)
learn
LearnA personalized and smart learning plan
exam
Practice TestTake a test on your terms and definitions
spaced repetition
Spaced RepetitionScientifically backed study method
heart puzzle
Matching GameHow quick can you match all your cards?
flashcards
FlashcardsStudy terms and definitions

1 / 11

flashcard set

Earn XP

Description and Tags

12 Terms

1

What is penetration testing?

  • ethical hacking done to probe a network for any risks or weaknesses so that they can be resolved

New cards
2

What are internal tests?

  • a penetration test done from within the network to see the damage that could be done by someone with a registered company account

New cards
3

What are external tests?

  • white hat hackers infiltrate a compay from the outside

New cards
4

What are blind tests?

  • done with no inside information to simulate what a real hacker would have to do to infiltrate the system

New cards
5

What are targeted tests?

  • conducted by the company’s IT department and the penetration team cooperating together to find faults in the system

New cards
6

What is the purpose of anti malware software?

  • to scan through all files on a computer and check them against a database of known malware

  • files with similar features to malware are detected and deleted

  • software should be updated regularly so that it can detect the lastest threats

  • other roles of anti-malware software:

    • Checking all incoming and outgoing emails and their attachments.

    • Checking files as they are downloaded.

    • Scanning the hard drive for viruses and deleting them.

New cards
7

What is a firewall and its purpose?

  • a tool to seperate a trusted network from an untrusted network (usually the internet)

  • may run as software or be a dedicated unit built into the hardware

  • all incoming/outgoing traffic is scanned by examining the source and destination addresses of packets

  • packets are subject to filtering criteria which determine whether to allow or block packets. unauthorised packets are filtered out

capabilities

  • can filter packets from certain IP addresses

  • can prevent access to certain ports on the network

roles

  • to prevent unauthorised access to computers on a network

  • also used to - block access to insecure or malicious sites, blocking certain programs from accessing the internet, blocking unauthorised downloads, preventing specific users on the network from accessing certain files

New cards
8

What are the features of secure passwords?

  • minimise the chance of unauthorised users accessing a system

  • should be changed regularly

should contain

  • mix upper and lowercase letters

  • numbers

  • special characters

  • 8 characters or more

New cards
9

What do user access levels do?

  • determine the facilities a user has access to

  • important to set access levels so that only authorised users can view and change data.

  • The more users who have access to a file, the more likely it is to be compromised.

New cards
10

How is encryption used?

  • websites may use HTTPS

  • individual file can be encrypted using a password

  • harder for attackers to understand the data when they intercept

New cards
11

What physical security can be implemented?

  • lock to prevent access to server rooms or locations that store confidential data. Only authorised personnel are given the key.

  • Biometric entry to room

  • passcode entry to room

  • Other forms of physical security include keycards, security staff, CCTV cameras and alarms.

New cards
12

What are some acceptable use policies?

  • users should have secure passwords

  • users should not share passwords and change them regularly

  • users should not connect with unauthorised devices (e.g unfamiliar USB drives)

  • regular back up procedures

New cards
robot