Module 4: Modern Network Security Threats Flashcards
It is term that refers to policies and processes put in place by
companies to help prevent security incidents and data breaches as well as limit the extent of damage when security attacks do happen.
cyber security threat mitigation
Vectors of data loss
Email/Webmail
Unencrypted Devices
Cloud Storage Devices
Removable Media
Hard Copy
Improper Access Control
examples of outside perimeter security
On-premise security officers
Fences and gates
Continuous video surveillance
Security breach alarms
examples of inside perimeter security
Electronic motion detectors
Security traps
Continuous video surveillance
Biometric access and exit sensors
What are the virtual machine threats?
hyperjacking
instant on activation
antivirus storm
It is an is an attack in which a hacker takes malicious control over the hypervisor that creates the virtual environment within a VM host.
hyperjacking
A virtual attack where the attacks happen as soon as you activate them, meaning they have no activation frames.
instant on activation
It is the demand on computing resources that occurs when antivirus software simultaneously scans multiple guest virtual machines on a single physical host.
antivirus storm
What are the different components of a secure data center for cloud and virtual networks?
secure segmentation
threat defense
visibility
what are the critical MDM (mobile device management) functions for BYOD (bring your own device) network?
Data encryption
PIN enforcement
Data wipe
Data loss prevention
Jailbreak/root detection
One of the mobile device management method where it does not produce a certified report which is different to data erasure.
data wipe
One of the mobile device management method where it overwrites data without verification that the software was successful in overwriting to all sectors of the storage device.
data wipe
One of the mobile device management method where it produces an erasure report that the data is rendered unrecoverable and achieves data sanitization.
data erasure
One of the mobile device management method where it overwrites data from any data storage device using zeros and ones onto all sectors of the device and verifying the data has been erased.
data erasure
One of modern hacker title whose motivation is usually for personal or financial gain, but they can also be involved in cyber espionage, protest or perhaps are just addicted to the thrill of cybercrime
black hat hackers
One of modern hacker title who are responsible for writing malware, which is a method used to gain access to these systems.
black hat hackers
One of modern hacker title that works for companies as security specialists that attempt to find security holes via hacking.
White hat hackers
One of the modern hacker titles, also known as ethical hackers, that employs the same methods of hacking as black hats, with one exception—they do it with permission from the owner of the system first, which makes the process completely legal.
White hat hackers
One of modern hacker title that will look for vulnerabilities in a system without the owner’s permission or knowledge.
Grey hat hackers
One of modern hacker title that have little to no coding skills, and rely on available tools or exploit kits to carry out an attack.
script kiddie
One of modern hacker title that is used to describe a person who uses scripts or codes developed by real hackers to attack a network or website.
script kiddie
One of modern hacker title where a person who gains unauthorized access to computer files or networks in order to further social or political ends.
hacktivist
One of modern hacker title that published several leaks containing hacking tools, including several zero-day exploits. These these exploits and vulnerabilities targeted enterprise firewalls, antivirus software, and Microsoft products.
shadow brokers / vulnerability broker
Give at least 5 penetration testing tools.
- Password crackers
- Wireless hacking
- Network scanning and hacking
- Packet crafting
- Packet sniffers
- Rootkit detectors
- Fuzzers to search vulnerabilities
- Forensic
- Debuggers
- Hacking operating systems
- Encryption
- Vulnerability exploitation
- Vulnerability Scanners