Save
...
1.3
Networks
Network security threats
Save
Share
Learn
Content
Leaderboard
Learn
Created by
kayzz
Visit profile
Cards (19)
What is the overall aim of network security?
To only allow authorized users to access what they need, prevent unauthorized access, and minimize potential damage.
View source
What are the main types of hackers?
Black hat hackers: Malicious intent, steal secrets or cause damage.
White hat hackers: Ethical hackers, find and fix vulnerabilities.
Gray hat hackers: Not officially employed, inform companies of vulnerabilities.
View source
What is malware?
Malware is any computer code written with the intent to frustrate or harm.
View source
What are the typical effects of malware?
Deleting or corrupting files, causing crashes, slowing down systems, or logging keystrokes.
View source
What is a computer virus?
A computer virus is a piece of code capable of copying itself and spreading throughout a system.
View source
How does spyware function?
Spyware covertly obtains information about a user's computer activities by transmitting data from their device.
View source
What is a denial of service (DoS) attack?
A DoS attack floods a server with useless traffic, causing it to become overloaded.
View source
What is the difference between a DoS attack and a distributed denial of service (DDoS) attack?
A DDoS attack involves multiple systems orchestrating a synchronized attack against a single target.
View source
What is SQL injection?
SQL injection is a code injection technique used to attack data-driven applications by exploiting vulnerabilities in poorly coded database applications.
View source
What is social engineering in the context of network security?
An umbrella term for manipulation techniques that exploit human error.
Aims to obtain private information, access to restricted systems, or money.
Can lure users into exposing data or spreading malware.
View source
What is phishing?
Phishing is an online fraud technique used to trick users into giving out personal information.
View source
How does farming differ from phishing?
Farming misdirects users to fraudulent websites without their knowledge, while phishing tricks users into providing personal information.
View source
What are some common measures to prevent network security threats?
Firewalls: Control traffic and prevent unauthorized access.
User login credentials: Require usernames and passwords.
Anti-malware software: Protect against malware threats.
Regular software updates: Patch vulnerabilities.
Proxies: Act as intermediaries between users and the internet.
Encryption: Convert plain text into unreadable form.
View source
What is the function of a firewall?
A firewall is configured to let only certain types of traffic through and prevent unauthorized internet traffic.
View source
Why is it important to update software regularly?
Updating software is crucial to patch vulnerabilities that can be exploited by malware.
View source
What is the role of a proxy in network security?
A proxy acts as a physical device placed between a network and a remote source, controlling traffic in and out of the network.
View source
What is encryption?
Encryption is the process of turning plain text into an unreadable form using an algorithm and a unique key.
View source
Why are people considered the weak point in a computer system?
People can be manipulated into exposing sensitive information, making them a vulnerability that can be mitigated but never entirely eliminated.
View source
What are some ways to mitigate human vulnerabilities in network security?
User training programs: Educate users about security threats.
Awareness campaigns: Inform users about phishing and social engineering.
Regular updates: Keep users informed about new threats.
View source