1.4 Network Security

Cards (72)

  • What is malware?
    Malware is any type of harmful program that seeks to damage or gain unauthorized access to your computer system.
  • How does a virus spread?
    A virus can replicate itself and spread from system to system by attaching itself to infected files.
  • When is a virus activated?
    A virus is activated when opened by a human.
  • What can a virus do once activated?
    Once activated, a virus can change data or corrupt a system so that it stops working.
  • How does a worm differ from a virus in terms of spreading?
    A worm does not need an infected file or human interaction to spread.
  • How quickly can a worm spread across a network?
    A worm can spread very quickly across a network once it has infiltrated it.
  • What is a trojan?
    A trojan is a harmful program that looks like legitimate software to trick users into installing it.
  • What does a trojan do once installed?
    A trojan secretly gives the attacker backdoor access to the system.
  • Do trojans self-replicate?
    No, trojans do not self-replicate or infect other files.
  • What is SQL?
    SQL (Structured Query Language) is a programming language used for manipulating data in databases.
  • What is an SQL injection?
    An SQL injection is when a malicious SQL query is entered into a data input box on a website.
  • How can an SQL injection be exploited?
    If the website is insecure, the SQL query can trick the website into giving unauthorized access to the website’s database.
  • What can an SQL injection be used for?
    An SQL injection can be used to view and edit the contents of a database or even gain administrator privileges.
  • What is a DoS attack?
    A DoS (Denial of Service) attack is when a computer repeatedly sends requests to a server to overload the system.
  • What is the impact of a DoS attack?
    A server overload will slow the system and may take websites offline temporarily.
  • What is a DDoS attack?
    A DDoS (Distributed Denial of Service) attack is a coordinated attack using a botnet of infected systems to overload a server with requests.
  • How does a brute-force attack work?
    Every possible combination is tested in order from start to finish.
  • Is a brute-force attack a quick method?
    No, it is not a quick method but it should break the password eventually.
  • How can a brute-force attack be sped up?
    A brute-force attack can be sped up if multiple computer systems are used at the same time.
  • What is social engineering?
    Social engineering means to trick others into revealing their personal data by posing as a trusted source.
  • Give an example of social engineering.
    Impersonating an IT technician of a school via email and asking for a student's username and password.
  • What is data interception?
    Data interception is when data packets on a network are intercepted by a third party and copied to a different location than the intended destination.
  • What software is used for data interception?
    Software called packet sniffers are used to intercept and analyze data packets.
  • What are the types of malware discussed in the study material?
    • Virus
    • Worm
    • Trojan
    • Spyware
    • Keylogger
    • Ransomware
  • What are the characteristics of a virus?
    1. Can replicate itself
    2. Spreads by attaching to infected files
    3. Activated when opened by a human
  • What are the characteristics of a worm?
    1. Can replicate itself
    2. Spreads by finding weaknesses in software
    3. Does not need human interaction to spread
  • How does ransomware work and why is it difficult to trace attackers?
    • Ransomware locks files using encryption.
    • Attackers demand money to decrypt data.
    • They use digital currencies like bitcoin for anonymity.
  • What is the difference between a DoS attack and a DDoS attack?
    • DoS: Single source overloads a server.
    • DDoS: Multiple sources (botnet) overload a server.
  • What are the impacts of a DoS attack?
    • Slows the system
    • May take websites offline temporarily
  • What is the process of a brute-force attack?
    • Tests every possible password combination.
    • Not quick but will eventually break the password.
    • Can be sped up with multiple systems.
  • What is data interception and how is it done?
    • Data interception involves copying data packets by a third party.
    • Packet sniffers are used to intercept and analyze data.
  • What is the purpose of a penetration test?
    To review the system's security and find risks or weaknesses
  • What are the four main types of penetration tests?
    Internal tests, external tests, blind tests, and targeted tests
  • What is the focus of internal penetration tests?
    To see how much damage could be done by someone within the company
  • What do external penetration tests aim to do?
    To infiltrate a system from outside the company
  • What is the purpose of blind penetration tests?
    To simulate what a real attacker would do without inside information
  • How are targeted penetration tests conducted?
    By the company's IT department and the penetration team working together
  • What is the primary function of anti-malware software?
    To locate and delete malware on a computer system
  • How does anti-malware software identify malware?
    By scanning files and comparing them against a database of known malware
  • Why must anti-malware software be regularly updated?
    To keep systems secure against new forms of malware