Computer Security Threats
16 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the term used to describe an individual or organization responsible for sending spam?

  • Spyware
  • Spammer (correct)
  • Phisher
  • Hacker
  • What is the primary function of a Firewall?

  • To control the traffic between networks and prevent unauthorized access (correct)
  • To intercept internal user requests and process them on behalf of the user
  • To block all incoming and outgoing internet traffic
  • To tunnel traffic between two sides of a network
  • What type of threat can overload ISPs, email servers, and individual end-user systems?

  • Spam (correct)
  • Spyware
  • Viruses
  • Trojan Horses
  • What is the term used to describe a program that gathers personal information from a computer without permission?

    <p>Spyware</p> Signup and view all the answers

    What is the primary function of a Proxy Server?

    <p>To intercept internal user requests and process them on behalf of the user</p> Signup and view all the answers

    What is the term used to describe a system that watches network traffic and detects intrusions?

    <p>NIDS</p> Signup and view all the answers

    What is the term used to describe a secure network connection between two endpoints?

    <p>VPN</p> Signup and view all the answers

    What is the type of firewall that prevents or allows access based on IP or MAC addresses?

    <p>Static Packet Filtering</p> Signup and view all the answers

    What is the primary function of a NIPS?

    <p>To stop traffic in case of an intrusion</p> Signup and view all the answers

    What type of firewall is described as a 'deep-packet inspection firewall'?

    <p>Next-generation Firewall (NGFW)</p> Signup and view all the answers

    What is the main purpose of digital signatures?

    <p>To ensure non-repudiation and integrity</p> Signup and view all the answers

    What is the role of a certification authority in digital certificates?

    <p>To verify the authenticity of digital certificates</p> Signup and view all the answers

    What is the process of converting plaintext into ciphertext?

    <p>Encryption</p> Signup and view all the answers

    What is the primary purpose of a digital certificate?

    <p>To authenticate the identity of a website</p> Signup and view all the answers

    What type of encryption algorithm uses the same key for both encryption and decryption?

    <p>Symmetric encryption</p> Signup and view all the answers

    What is the main advantage of using a NGFW over a traditional firewall?

    <p>Improved security</p> Signup and view all the answers

    Study Notes

    Network Threats

    • Spam: a serious network threat that can overload ISPs, email servers, and individual end-user systems
    • Spammer: a person or organization responsible for sending spam
    • Spam can take control of home computers using hacking techniques like viruses, worms, and Trojan horses
    • Spyware: any program that gathers personal information from a computer without permission or knowledge
    • Tracking Cookies: a form of spyware used to record information about an Internet user

    Firewall

    • A Firewall: a security tool that protects internal network users from external threats
    • Resides between two or more networks, controlling traffic and preventing unauthorized access
    • Types of Firewalls:
    • Static Packet Filtering (stateless firewall): allows or blocks access based on IP or MAC addresses
    • Dynamic Packet Filtering (stateful firewall): only allows incoming packets that are legitimate responses to requests from internal hosts

    Proxy Server

    • A computer system or application that intercepts internal user requests and processes them on behalf of the user
    • Goal: to hide the IP address of client systems inside the secure network

    VPN

    • Tunnels traffic between two sides of a network
    • Types:
    • Remote Access VPN
    • Site to Site VPN

    Intrusion Detection and Prevention Systems

    • NIDS (Network-based Intrusion Detection System): watches network traffic, detects intrusions, and sends alarms and logs
    • NIPS (Network-based Intrusion Prevention System): stops traffic when an intrusion is detected
    • Types of detection methods:
    • Signature-based: looks for a perfect match
    • Anomaly-based: builds a baseline of what is normal
    • Behavior-based: observes and reports

    Next Generation Firewall (NGFW)

    • A deep-packet inspection firewall that moves beyond port/protocol inspection and blocking
    • Adds application-level inspection, intrusion prevention, and brings intelligence from outside the firewall

    Encryption

    • Process of encoding information to convert plaintext into ciphertext
    • Requires a key for encryption and decryption
    • Symmetric encryption: uses the same key for encryption and decryption (not secure)
    • Asymmetric encryption: uses a pair of keys (public and private)

    Digital Signatures

    • Created by hashing a document and encrypting the hash with a private key
    • Verifiable by the owner of the private key and any entity with the public key
    • Provides non-repudiation and integrity, but not confidentiality

    Digital Certificates

    • Electronic file containing identification information, including a public key, and a digital signature from a certification authority
    • Allows verification of authenticity and enables HTTPS

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Description

    This quiz covers common computer security threats, including spam and spyware. Learn about the impact of spam on networks and how spammers operate, as well as the dangers of spyware and how it collects personal information.

    More Like This

    Use Quizgecko on...
    Browser
    Browser