Lecture 13 - Firewall and Malware

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/30

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

31 Terms

1
New cards

Intrusion

Any unauthorized activity on a computer network

2
New cards

types of intruders

Casual, hackers, professionals, employees

3
New cards

Casual Intruders

limited knowledge, use hacking tools

4
New cards

Hackers

Usually for status or hobby, crackers cause damage

5
New cards

Professionals

corporate/international espionage, theft of information or assets

6
New cards

Employees

legitimate access to network, unauthorized information

7
New cards

Firewall

Router or special purpose device that examines packets flowing into and out of a network and restricts access to the organization’s network

8
New cards

Where are firewalls placed

On every network connection between the organization and the internet

no access permitted expect through firewall

<p>On every network connection between the organization and the internet</p><p>no access permitted expect through firewall</p>
9
New cards

3 Type of firewalls

Packet level, application level, network address translation (NAT)\

10
New cards

Packet Level Firewall

Examines IP addresses (Source and destination)

examines TCP port ID

will permit packet if satisfy certain conditions (IP address and port number)

protect all applications

cheapest, like family doctor (protecting everything)

<p>Examines IP addresses (Source and destination)</p><p>examines TCP port ID</p><p>will permit packet if satisfy certain conditions (IP address and port number)</p><p>protect all applications</p><p>cheapest, like family doctor (protecting everything) </p>
11
New cards

downside to packet level firewall

Simplest, least secure, logic independent of other packets

12
New cards

Application-level firewall

monitors connections, uses rules to determine what client may do (no executable files, no changes to files)

performs checks against know security holes of each application

specialist

13
New cards

Security holes

a bug that permits unauthorized access

14
New cards

Network Address Translation (NAT) Firewall

Transparent process

hides internal IP address, assigns public address (PO Box)

sometimes used to conserve IP addresses

uses address table relating to ‘port number’ to internal computer

like post office

<p>Transparent process</p><p>hides internal IP address, assigns public address (PO Box)</p><p>sometimes used to conserve IP addresses</p><p>uses address table relating to ‘port number’ to internal computer</p><p>like post office </p>
15
New cards

Firewall Architecture

many organization use layers of NAT, Packet level, and application-level firewalls

16
New cards

Network design using firewalls example

knowt flashcard image
17
New cards

Malware (malicious software)

any program or file that is harmful to a computer user

18
New cards

types of malware

computer viruses, worms, trojan horses, and spyware

19
New cards

Virus

malicious code that replicates by copying itself to another program, computer boot sector or document and changes how a computer works

20
New cards

How does Virus spread

With human interaction

requires someone to knowingly or unknowingly spread the infection without the knowledge or permission of a user or system administrator

21
New cards

How does a virus infect

only if someone runs the exe file

22
New cards

Worm

special type of virus that spreads itself without human intervention

sub class of virus

23
New cards

How do worms spread

without human intervention

copies itself from computer to computer

sending copies of themselves via emails or security holes

24
New cards

end result of worms

worm consumes too much system memory (or network bandwidth) causing the servers to stop responding

25
New cards

Trojan Horses

poses as a useful software, once ran will damage

remote access management consoles (rootkits) that enable users to access a computer and manage it from afar

26
New cards

Lasting effects of trojan horses

silly things like random picture

to deleting files

and will create backdoor for bad guy

27
New cards

Do Trojan horses spread

no they cannot infect other files or self-replicate

28
New cards

Spyware

Software that aims to gather information about a person or organization

29
New cards

Ransomware

type of malware designed to deny access to a computer system or data until a ransom is paid

30
New cards

how is ransomware spread

through phishing emails or unknowingly visiting an infected website

31
New cards

How to prevent malware

use security (antivirus) software

keep you security software up to date

update your OS and other software

be wary of email attachments

back up important data to external hard drive