Network security threats

Cards (19)

  • What is the overall aim of network security?
    To only allow authorized users to access what they need, prevent unauthorized access, and minimize potential damage.
  • What are the main types of hackers?
    • Black hat hackers: Malicious intent, steal secrets or cause damage.
    • White hat hackers: Ethical hackers, find and fix vulnerabilities.
    • Gray hat hackers: Not officially employed, inform companies of vulnerabilities.
  • What is malware?
    Malware is any computer code written with the intent to frustrate or harm.
  • What are the typical effects of malware?
    Deleting or corrupting files, causing crashes, slowing down systems, or logging keystrokes.
  • What is a computer virus?
    A computer virus is a piece of code capable of copying itself and spreading throughout a system.
  • How does spyware function?
    Spyware covertly obtains information about a user's computer activities by transmitting data from their device.
  • What is a denial of service (DoS) attack?
    A DoS attack floods a server with useless traffic, causing it to become overloaded.
  • What is the difference between a DoS attack and a distributed denial of service (DDoS) attack?
    A DDoS attack involves multiple systems orchestrating a synchronized attack against a single target.
  • What is SQL injection?
    SQL injection is a code injection technique used to attack data-driven applications by exploiting vulnerabilities in poorly coded database applications.
  • What is social engineering in the context of network security?
    • An umbrella term for manipulation techniques that exploit human error.
    • Aims to obtain private information, access to restricted systems, or money.
    • Can lure users into exposing data or spreading malware.
  • What is phishing?
    Phishing is an online fraud technique used to trick users into giving out personal information.
  • How does farming differ from phishing?
    Farming misdirects users to fraudulent websites without their knowledge, while phishing tricks users into providing personal information.
  • What are some common measures to prevent network security threats?
    • Firewalls: Control traffic and prevent unauthorized access.
    • User login credentials: Require usernames and passwords.
    • Anti-malware software: Protect against malware threats.
    • Regular software updates: Patch vulnerabilities.
    • Proxies: Act as intermediaries between users and the internet.
    • Encryption: Convert plain text into unreadable form.
  • What is the function of a firewall?
    A firewall is configured to let only certain types of traffic through and prevent unauthorized internet traffic.
  • Why is it important to update software regularly?
    Updating software is crucial to patch vulnerabilities that can be exploited by malware.
  • What is the role of a proxy in network security?
    A proxy acts as a physical device placed between a network and a remote source, controlling traffic in and out of the network.
  • What is encryption?
    Encryption is the process of turning plain text into an unreadable form using an algorithm and a unique key.
  • Why are people considered the weak point in a computer system?
    People can be manipulated into exposing sensitive information, making them a vulnerability that can be mitigated but never entirely eliminated.
  • What are some ways to mitigate human vulnerabilities in network security?
    • User training programs: Educate users about security threats.
    • Awareness campaigns: Inform users about phishing and social engineering.
    • Regular updates: Keep users informed about new threats.