Methods of Preventing a Network Attack (OCR GCSE Computer Science)

Revision Note

Flashcards
James Woodhouse

Expertise

Computer Science

Penetration Testing

What is penetration testing?

  • Penetration testing is a method of preventing vulnerabilities whereby a company employ people to try and hack their network and databases
  • This allows the 'hackers' to point out the parts of the system that are vulnerable 
  • The companies then use this information to fix the issues that are found

What form of attack would this help to prevent?

  • SQL injection

Anti-Malware Software

What is anti-malware software?

  • Anti-malware software is a term used to describe a combination of different software to prevent computers from being susceptible to viruses and other malicious software
  • The different software anti-malware includes are
    • Anti-virus 
    • Anti-spam 
    • Anti-spyware 

How does anti-malware work?

  • Anti-malware scans through email attachments, websites and downloaded files to search for issues
  • Anti-malware software has a list of known malware signatures to block immediately if they try to access your device in any way
  • Anti-malware will also perform checks for updates to ensure the database of known issues is up to date

What form of attack would this prevent?

  • Anti-malware would help prevent against any form of malicious software

Firewalls

What is a firewall?

  • A firewall is a barrier between a network and the internet
  • A firewall prevents unwanted traffic from entering a network by filtering requests to ensure they are legitimate
  • It can be both hardware and software and they are often used together to provide stronger security to a network
    • Hardware firewalls will protect the whole network and prevent unauthorised traffic
    • software firewalls will protect the individual devices on the network, monitoring the data going to and from each computer

What form of attack would this prevent?

  • Hackers
  • Malware
  • Unauthorised Access to a Network
  • DOS/DDOS attacks

User Access Levels & Passwords

What are user access levels?

  • User access levels ensure users of a network have designated roles on a network
  • Some examples of different levels of access to a school network include
    • Administrators: Unrestricted - Can access all areas of the network
    • Teaching Staff: Partially restricted - Can access all student data but cannot access other staff members' data
    • Students: Restricted - Can only access their own data and files

What are passwords?

  • Passwords are a digital lock to prevent unauthorised access to an account
  • They are often stored as an encrypted/ciphered text entry in a database, ensuring that even with unauthorised access to a database, a hacker would not be able to gain access to the individual passwords of users

What form of attack would this prevent?

  • Data Interception and Theft
  • Physical Security Issues
  • SQL Injection

Encryption

What is encryption?

  • Encryption is a method of converting plain text into ciphered text to be stored
  • Encryption uses complex mathematical algorithms to scramble the text
  • Asymmetric encryption, also known as private key, public key encryption is often used for web pages and other communication

What form of attack would this prevent?

  • Encryption plays a role in all forms of attack on a network
  • It is important to note that it does not prevent the attacks from occurring but it does stop the attacker from gaining access to the information

Physical Security

What is physical security?

  • Physical security is a method of physically preventing access to any part of a network
  • There are a range of physical security measures that can be implemented on a network
    • Locked doors: Preventing access to server rooms and cabinets of switches
    • Biometrics: Fingerprint scanners, facial recognition and retinal scans 
    • Surveillance Cameras: Monitoring the activity around the site where crucial networking hardware is located

What form of attack would this prevent?

  • Data interception and theft
  • Social engineering

Summary of attacks a preventative measures

Form of Attack Preventative Measure
Malware Anti-Malware Software
Firewalls
Encryption
Physical Security
Social Engineering User Access Levels & Passwords
Physical Security
Brute-Force Attacks User Access Levels & Passwords
Denial of Service Attacks Firewalls
Data Interception & Theft Encryption
Physical Security
SQL Injection Penetration Testing
User Access Levels & Passwords

Worked example

A web development company wants to protect their computer systems and data from unauthorised access.

Identify and describe two software-based security methods that the company can use to protect their computer systems and data. [6]

How to answer this question

  • You should give a security measure for one mark, then describe it for the additional two marks
  • You must do this for two different security measures to be able to achieve all 6 marks

Answers

  • Anti-malware
    • Scans for / identifies virus/spyware/malware
    • Compares data to a database of malware
    • Alerts user and requests action
    • Quarantines/deletes virus/spyware/malware
    • Stops the download of virus/spyware/malware
  • Firewall
    • Scans incoming and outgoing traffic
    • Compares traffic to a criteria
    • Blocks traffic that is unauthorised
    • Blocks incoming/outgoing traffic
  • Encryption
    • Scrambles data using an algorithm
    • So if intercepted it cannot be understood
    • Key needed to decrypt
  • User access levels
    • Data can be read/write/ read-write
    • Prevents accidental changes
    • Limits data users can access
  • Passwords/biometrics/authentication code/fingerprint
    • Has to be correctly entered to gain access
    • Strong password // letters, numbers, symbols // fingerprint is unique to individual
    • Harder/impossible for a brute-force attack to succeed
    • Lock after set number of failed attempts

You've read 0 of your 0 free revision notes

Get unlimited access

to absolutely everything:

  • Downloadable PDFs
  • Unlimited Revision Notes
  • Topic Questions
  • Past Papers
  • Model Answers
  • Videos (Maths and Science)

Join the 100,000+ Students that ❤️ Save My Exams

the (exam) results speak for themselves:

Did this page help you?

James Woodhouse

Author: James Woodhouse

James graduated from the University of Sunderland with a degree in ICT and Computing education. He has over 14 years of experience both teaching and leading in Computer Science, specialising in teaching GCSE and A-level. James has held various leadership roles, including Head of Computer Science and coordinator positions for Key Stage 3 and Key Stage 4. James has a keen interest in networking security and technologies aimed at preventing security breaches.