1.4 network security

Cards (27)

  • What are the two main forms of attack in network security?
    Active and Passive
  • What is an active attack?
    An attempt to modify or delete data
  • What is a passive attack?
    An attempt to retrieve information without changes
  • What is an internal attack?
    An attack by someone inside the organization
  • What is an external attack?
    An attack by someone outside the organization
  • What are the qualities of a strong password?
    • At least eight characters
    • Include upper and lower case
    • Include special characters
    • Include numbers
    • Does not include a name
    • Does not contain a complete word
    • Relates to an acronym
  • What is a virus in terms of malware?
    Malicious software hiding within another application
  • How do worms differ from viruses?
    Worms replicate through a network independently
  • What are Trojans in malware?
    Programs pretending to be legitimate but are malware
  • What is spyware?
    Monitors user activities and sends information back
  • What is ransomware?
    Blackmails users into making a payment
  • What are the types of malware?
    • Viruses
    • Worms
    • Trojans
    • Spyware
    • Ransomware
  • What is social engineering in network security?
    Tricking users into giving out information
  • What is a brute force attack?
    Trial and error to find the correct password
  • What is a denial of service (DOS) attack?
    Overloads a computer or network with traffic
  • What is data interception and theft?
    Looking at data traveling over a network
  • What is SQL injection?
    Entering SQL code to modify database data
  • What is malware?
    Malicious software designed to cause harm
  • What are methods for identifying and preventing vulnerabilities?
    • Penetration testing
    • User access levels
    • Secure passwords
    • Encryption
    • Anti-malware software
    • Firewalls
    • Physical security
  • What is penetration testing?
    Scanning for security weaknesses in a network
  • What are user access levels?
    Controls which parts of a system users can access
  • Why are secure passwords important?
    They defend against brute force attacks
  • What is encryption?
    Translating data into code for security
  • What is anti-malware software?
    Prevents and removes malware from systems
  • What is the function of firewalls?
    Monitors and controls network traffic
  • What is physical security?
    Controls access to important hardware
  • What are some examples of physical security measures?
    Security guards, locks, CCTV, swipe cards