11. Network Security Fundamentals Flashcards
List out the 4 types of threats
- Information Theft
- Data Loss and Manipulation
- Identity Theft
- Disruption of Service
What will result in when network are being attacked?
- Loss of Time & Money due to damange
- Theft important information or assets
How does attacker access network? ( )
- Software Vulnerabilities ( Bug )
- Hardware Attacks
- Guessing someone Username and Password
- Modifying software or exploiting vulnerabilities
What is vulnerability ?
- Degree of weakness in a network or a device
What device that may have some vulnerability? ( 5 )
- Routers
- Switches
- Desktops
- Servers
- Security Devices
List out the 3 primary vulnerabilities or weakness
- Technological Vulnerabilities
- Configuration Vulnerabilities
- Security Policy Vulnerabilities
What does Technological Vulnerabilities might include ( 3 )
- TCP/IP Protocol Weakness
- Operating System Weakness
- Network Equipment Weakness
What does Configuration Vulnerabilities might include?
- Unsecured user accounts
- System accounts with easily guessed passwords
- Misconfigured internet services
- Unsecure default settings
- Misconfigured netwoek equipment
What does Security Policy Vulnerabilities might include?
- Lack of a written security policy, politics
- Lack of authentication continuity
- Logical access controls not applied
- Software and Hardware Installation
- Changes not following policy
- Nonexistent disaster recovery plan
List out the 4 classes of physical threads
- Hardware Threats
- Environment Threads
- Electrical Threats
- Maintenance Threats
What does Hardware Threads includes?
- Physical Damage to
- Servers
- Routers
- Switches
- Cabling Plant
- Workstations
What does Environment Threats includes?
- Extreme Temperature
- Extreme Humidity
What does Electrical Threats include?
- Voltage Spikes
- Insufficient Supply Voltage
- Unconditioned Power
- Total power loss
What does Maintenance Threats includes?
- Poor handling of key electrical components
- Lack of critical spare parts
- Poor cabling
- Poor labeling
What is the short form for Malicious Software?
- Malware
What is viruses?
- A malware that propagates by inserting a copy of itself into, and becoming part of, another program
- Spreads from one computer to another, leaving infections as it travels
What are the types of malware?
- Viruses
- Worms
- Trojan Horses
What is worms?
- Similar to viruses in that they replicate functional copies of themselves and can cause the same type of damage.
What is the difference between viruses and worms?
- Viruses need to spread from an infected host file
- While worms are standalone software and do not require a host program or human help to propagate
What is Trojan Horses?
- Harmful piece of software that looks legimate
Do trojan horses reproduce by infectting other files?
- No
- It must spread through user interaction ( Opening and email attachment , Downloading a file from the internet )
List out 3 major categories for network attacks
- Reconaissance Attacks
- Discovery and Mapping of Systems, Services or Vulnerabilities
- Access Attacks
- The unauthorized manipulation of data system access, or user privileges
- Denial Of Service
- The disabling or corruption of networks, systems, or services
List out the 4 types of access attacks
- Password Attacks
- Trust Exploitation
- Port Redirection
- Man-in-the middle
How does attacker attacks password?
- Brute Force
- Trojan Horse
- Packet Sniffers