Network security threats

    Cards (19)

    • What is the overall aim of network security?
      To only allow authorized users to access what they need, prevent unauthorized access, and minimize potential damage.
    • What are the main types of hackers?
      • Black hat hackers: Malicious intent, steal secrets or cause damage.
      • White hat hackers: Ethical hackers, find and fix vulnerabilities.
      • Gray hat hackers: Not officially employed, inform companies of vulnerabilities.
    • What is malware?
      Malware is any computer code written with the intent to frustrate or harm.
    • What are the typical effects of malware?
      Deleting or corrupting files, causing crashes, slowing down systems, or logging keystrokes.
    • What is a computer virus?
      A computer virus is a piece of code capable of copying itself and spreading throughout a system.
    • How does spyware function?
      Spyware covertly obtains information about a user's computer activities by transmitting data from their device.
    • What is a denial of service (DoS) attack?
      A DoS attack floods a server with useless traffic, causing it to become overloaded.
    • What is the difference between a DoS attack and a distributed denial of service (DDoS) attack?
      A DDoS attack involves multiple systems orchestrating a synchronized attack against a single target.
    • What is SQL injection?
      SQL injection is a code injection technique used to attack data-driven applications by exploiting vulnerabilities in poorly coded database applications.
    • What is social engineering in the context of network security?
      • An umbrella term for manipulation techniques that exploit human error.
      • Aims to obtain private information, access to restricted systems, or money.
      • Can lure users into exposing data or spreading malware.
    • What is phishing?
      Phishing is an online fraud technique used to trick users into giving out personal information.
    • How does farming differ from phishing?
      Farming misdirects users to fraudulent websites without their knowledge, while phishing tricks users into providing personal information.
    • What are some common measures to prevent network security threats?
      • Firewalls: Control traffic and prevent unauthorized access.
      • User login credentials: Require usernames and passwords.
      • Anti-malware software: Protect against malware threats.
      • Regular software updates: Patch vulnerabilities.
      • Proxies: Act as intermediaries between users and the internet.
      • Encryption: Convert plain text into unreadable form.
    • What is the function of a firewall?
      A firewall is configured to let only certain types of traffic through and prevent unauthorized internet traffic.
    • Why is it important to update software regularly?
      Updating software is crucial to patch vulnerabilities that can be exploited by malware.
    • What is the role of a proxy in network security?
      A proxy acts as a physical device placed between a network and a remote source, controlling traffic in and out of the network.
    • What is encryption?
      Encryption is the process of turning plain text into an unreadable form using an algorithm and a unique key.
    • Why are people considered the weak point in a computer system?
      People can be manipulated into exposing sensitive information, making them a vulnerability that can be mitigated but never entirely eliminated.
    • What are some ways to mitigate human vulnerabilities in network security?
      • User training programs: Educate users about security threats.
      • Awareness campaigns: Inform users about phishing and social engineering.
      • Regular updates: Keep users informed about new threats.
    See similar decks