Search Header Logo
J277.1.4.2.NetworkSecurity

J277.1.4.2.NetworkSecurity

Assessment

Presentation

Computers

10th - 11th Grade

Practice Problem

Medium

Created by

Ian Currie

Used 4+ times

FREE Resource

16 Slides • 33 Questions

1

J277.1.4.2. Network Security

By Mr. Shingari

2

Retrieval practice: Networks

By Mr. Shingari

3

Multiple Choice

A peer to peer network always has a central server
1
False
2
True

4

Multiple Choice

In a client server network, all clients are equally powerful.
1
False
2
True

5

Multiple Choice

Which one of these items is not an advantage of a client-server network?
1
No central point of failure
2
Central control of security
3
Easier to supervise network performance
4
Easier to perform software upgrades

6

Multiple Choice

Question image

In this image what are the B's known as?

1

Servers

2

Peers

3

Clients

4

Hardware

7

Open Ended

Give three factors that can affect the performance of a network. (3 marks)

8

Open Ended

Give one similarity and one difference between a hub and a switch? ( 2 marks)

9

Open Ended

Give one similarity and one difference between a switch and a router? ( 2 marks )

10

Open Ended

Give one advantage of using wired network connections over wireless? (2 marks)

11

Open Ended

Write two advantages of client-server network? (2 marks)

12

Multiple Choice

Question image
What type of network is this?
1
Ring 
2
Bus 
3
Star
4
Mesh

13

Multiple Choice

In a star network
1
Each device is connected to a switch or hub
2
Each device connects to each other
3
Each device is connected in a line
4
Each device is connected to a terminal

14

Multiple Choice

What is meant by the term 'network topology'?
1
A collection of protocols that work together to achieve the complex task of networking
2
The security of a network
3
How the devices on a network are physically arranged and connected
4
The bandwidth and latency of a network

15

Multiple Choice

Which of the following is an advantage of Wi-Fi over wired networks?
1
Useful for networking hard to reach places
2
Suffers from less interference
3
Higher bandwidth
4
More secure

16

Open Ended

What is the difference between a MAC address and an IP address?

17

Walts

  • Explain the different types of malware.

  • Discuss a real-life malware-related event.

  • Understand how phishing operates.

  • Discuss how data can be intercepted.

Subject | Subject

1.4.2.Network security

18

19

Keywords

  • Malware

  • Viruses

  • Worms

  • Trojan horses

  • Phishing

  • Social engineering

  • Data interception

J277 Computer Science​

1.4.2.Network security

20

Malware

  • Otherwise known as ‘malicious software’.

  • Software which can be malicious if damaging to a computer or network.

  • Examples include viruses, worms and Trojan horses.

J277 Computer Science​

1.4.2.Network security

21

Viruses

  • Malicious software designed to cause harm to a network or computer system.

  • Attaches itself to programs or files on a computer or server.

  • Can affect all components of an operating system.

  • Around 82,000 viruses are made each day.

  • Famous viruses include Stuxnet and CryptoLocker

  • Source: https://uk.norton.com/nortonblog/2016/02/the_8_most_famousco.html

J277 Computer Science​

Walt: Explain the different types of malware.

22

Fill in the Blank

Viruses designed to cause h--- to a network or computer system.

23

Fill in the Blank

Viruses designed to cause harm to a network or computer system.

At------ itself to programs or files on a computer or server.

24

Fill in the Blank

Viruses designed to cause harm to a network or computer system.

Attaches itself to programs or files on a computer or server.

Can ------ all components of an operating system.

25

Worms

  • Replicates itself in order to spread to other computers.

  • Often using a computer network.

  • In order to achieve this, the worm exploits vulnerabilities across the computer network.

  • Unlike a virus, it does not need to attach to a program.

J277 Computer Science​

Walt: Explain the different types of malware.

26

Fill in the Blank

Worms R--------- itself in order to spread to other computers.

27

Fill in the Blank

Worms Replicates itself in order to spread to other computers.

Often using a computer n------.

In order to achieve this, the worm exploits vulnerabilities across the computer network.

Unlike a virus, it does not need to attach to a program.

28

Fill in the Blank

Worms Replicates itself in order to spread to other computers.

Often using a computer network.

In order to achieve this, the worm ex------ vulnerabilities across the computer network.

Unlike a virus, it does not need to attach to a program.

29

Fill in the Blank

Worms Replicates itself in order to spread to other computers.

Often using a computer network.

In order to achieve this, the worm exploits vulnerabilities across the computer network.

Unlike a virus, it does --- need to attach to a program.

30

Trojan horses

  • Malicious computer program.

  • Designed to access a computer by misleading users of its intent.

Example: Email appearing to have been sent from a bank asking to download security software which would improve security. In fact the intention behind the software is to give unauthorised access to the system.

J277 Computer Science​

Walt: Explain the different types of malware.

31

Trojan horses

  • Malware, otherwise known as ‘malicious software’, is software which can be damaging to a computer or network.

J277 Computer Science​

Walt: Explain the different types of malware.

32

Wilf

  • You can identify different types of malware from the definition.

  • You understand different features of various malware.

J277 Computer Science​

Walt: Explain the different types of malware.

33

Open Ended

Define what malware is?

34

Open Ended

Identify the three types of malware and give brief definition of each in your own words.

35

Open Ended

Give examples of three types of malware you explained in previous question.

36

Multiple Select

Replicates by reproducing itself

1

Worms

2

Viruses

3

Trojan horses

37

Multiple Choice

Infects other programs by modifying them

1

Worms

2

Viruses

3

Trojan horses

38

Multiple Choice

Takes advantage of parts of an operating system that are not usually visible to the user, for example system files

1

Worms

2

Viruses

3

Trojan horses

39

Multiple Choice

Does not alter files

1

Worms

2

Viruses

3

Trojan horses

40

Multiple Choice

Resides in active memory

1

Worms

2

Viruses

3

Trojan horses

41

Multiple Choice

Often disguised as legitimate software

1

Worms

2

Viruses

3

Trojan horses

42

Multiple Choice

Can allow control of the system and its’ key functions, including:

Deleting data

Blocking data

Modifying data

Copying data

Disrupting the performance of computers or computer networks

1

Worms

2

Viruses

3

Trojan horses

43

Multiple Choice

Can allow control of the system and its’ key functions, including:

Deleting data

Blocking data

Modifying data

Copying data

Disrupting the performance of computers or computer networks

1

Worms

2

Viruses

3

Trojan horses

44

Social engineering

Relies on human interaction (social skills).

  • Commonly involves tricking users into breaking normal security procedures.

  • Method does not revolve around technical cracking techniques such as worms or viruses.

J277 Computer Science​

Walt: Understand how phishing operates

45

Computer phishing

  • Form of social engineering.

  • Designed to acquire sensitive information such as usernames, passwords, card details etc.

  • Most common phishing attacks are sent through email.

J277 Computer Science​

Walt: Understand how phishing operates

46

Computer phishing

J277 Computer Science​

Walt: Understand how phishing operates

media

47

Telephone (IVR) phishing

  • Telephone system mirroring – direct phone calls that pretend to be an official service.

  • For example, an interactive voice response (IVR) telephone phishing system would request similar prompts to a bank if the exploit was to gain banking information.

  • User could be asked to enter bank number, expiry, CCV, PIN and system may reject or ask for re-entry to ensure original digits are correct.

  • Users may also be referred to a fake customer service agent to extract more details.

J277 Computer Science​

Walt: Understand how phishing operates

48

Open Ended

Question image

Identify how you could tell this email may be a phishing email

49

How to identify phishing email

J277 Computer Science​

Walt: Understand how phishing operates

media

J277.1.4.2. Network Security

By Mr. Shingari

Show answer

Auto Play

Slide 1 / 49

SLIDE