Computing 1

Cards (19)

  • What is penetration testing?

    It is the practice of deliberately trying to find security holes in your own systems.
  • What is the goal of penetration testing?
    The goal is to identify targets of potential attacks and possible entry points.
  • What types of malware can anti-malware software detect?
    Viruses, worms, trojans, and spyware.
  • What happens when a new malware is detected by anti-malware software?
    It is sent to the anti-virus company for verification and signature creation.
  • Why is it harder to create a signature for some viruses?
    Because viruses can morph to avoid detection.
  • What is encryption used for?
    To secure data so that it cannot be read without the encryption key.
  • How are passwords stored by websites?
    They are almost always stored in an encrypted form.
  • How can you tell if a website is encrypting communication?
    By checking if the website uses HTTPS.
  • What does HTTPS stand for?
    Secure HyperText Transfer Protocol.
  • What is a packet filter in firewalls?
    It checks packets of information to see where they are coming from and going to.
  • What can firewalls prevent?
    They can prevent attackers from gaining access to computers on a network.
  • How do firewalls block malicious computers?
    By filtering packets from certain IP addresses.
  • What is a password policy?

    It ensures that chosen passwords conform to specific parameters.
  • What features might a password policy include?
    Minimum length, inclusion of lowercase and uppercase letters, and symbols.
  • Is "Pa55w*rd" a good password according to common policies?
    Yes, it meets the criteria of minimum length and character variety.
  • What is physical security?
    It is where hardware, software, and networks are protected by physical methods.
  • What are some methods of physical security?
    CCTV, intruder alarms, locks, fences, and security guards.
  • What are the threats and protections in digital systems?
    Threats:
    • Viruses
    • Worms
    • Trojans
    • Ransomware
    • Social engineering

    Protections:
    • Anti-malware
    • Encryption
    • Firewalls
    • Penetration testing
    • Physical security
    • User access levels
  • What is the purpose of user access levels?
    To set access rights on disks, folders, and individual files.