Module 1 Flashcards
Securing Networks
Networks are routinely under attack.
True
Maintains the interactive Cyberthreat Real-Time Map display of current network attacks.
Kapersky
Network security breaches can…
disrupt e-commerce, cause the loss of business data, threaten people’s privacy, and compromise the integrity of information
Cisco website that provides comprehensive security and threat intelligence
Cisco Talos Intelligence Group
What does PSIRT stand for?
Cisco Product Security Incident Response Team
PSIRT is responsible for..
investigating and mitigating potential vulnerabilities in Cisco products
What is an attack vector?
A path by which a threat actor can gain access to a server, host, or network.
Where do attack vectors originate from?
Inside or outside the corporate network.
How may threat actors target a network?
Through the internet
Why might threat actors target a network through the internet?
To disrupt network operations and create a DoS attack
The most common vector for data loss including instant messaging software and social media sites
Email/Social Networking
A stolen corporate laptop containing confidential organizational data is an example of having an…
Unencrypted Device
What happens when data isn’t stored using an encryption algorithm
A thief can retrieve valuable confidential data
What can happen with Cloud Storage Devices with sensitive data?
It can be lost if access to the cloud is compromised due to weak security settings
What is Removable media?
Any type of storage device that can be removed from a computer while the system is running
What could happen between a curious employee and a suspicious USB
The employee could perform an unauthorized transfer of data to a USB drive
What risk could happen involving a USB
Someone could lose it while it contained valuable corporate data
What should be done with confidential Hard Copies
It should be shredded when no longer required
Why should confidential Hard Copies be shredded?
A thief could retrieve discarded reports and gain valuable information
What could happen with Improper Access Control
Stolen or weak passwords which have been compromised can provide an attacker easy access to data
Virtual Private Networks (VPNs) ensure..
data confidentiality and integrity from authenticated sources
How do VPNs protect data?
It protects data in motion that is flowing from the CAN to the outside world
What does Adaptive Security Appliance (ASA) firewall do?
Performs stateful packet filtering to filter return traffic from the outside network into campus