Network Security Risk Flashcards

(4 cards)

1
Q

What are the network risks associated with People?

A
  • Intruders or attackers using social engineering or snooping to obtain user passwords
  • An administrator incorrectly creating or configuring user role and permission resulting in file and login access vulnerabilities
  • Network administrators overlooking security mistakes in topology or hardware configuration
  • Lack of proper documentation and communication of security policies, leading to intentional or un-intentional misuse of files or network access
  • An unused computer or terminal being left logged onto the network, thereby providing an entry point for an intruder
  • Users or administrators choosing easy-to-guess passwords
  • Authorized staff leaving computer room doors open or unlocked, allowing unauthorized individuals to enter
  • Staff throwing a way backup disk or storage in public dustbins
  • Admins neglecting to remove acounts who have left the organization
  • Users writing their passwords on paper, then placing the paper in an easily accessible place.

  • Jon Jones snooping arround trying to user social engineering to steal ankaleav’s password as ankaleve is the ufc account admin
  • Ankalaev is create other ufc fighters accounts and accidenly grants DDP an admin role and permissions
  • DPP see ankalaev mistake and just overlooks the flaw
  • JDM is mad that these errors happen and he gatthers every one to document and communicate the security policies
  • Islam is in meeting with his computer but leaves it open
  • volkanovski sees islam’s laptop open and gues his account passwor as password and it unlocks
  • Pathoja leaves comes and see volkanovski the room and tells him to leave but then pantoja forgets to lock the door
  • Francis is hungry and searches the dustbins while there he finds a hard drive
  • Adesanya ask him for the hard drive as he knows he can access it becauser the ufc did not delete his account when they fired him
  • Usman comes out the bin and tells adensanya there is not need he already found a password on the paper
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the securiy risk associated with hardware and Network Desing?

A
  • Wireless and wire-based transmissions can often be intercepted.
  • Networks that use leased public lines, the Internet, are vulnerable to eavesdropping.
  • Network hubs broadcast traffic over the entire segment, thus making transmissions more widely vulnerable to sniffing.
  • Unused routers, ports can be exploited and accessed by crackers if they are not disabled.
  • If routers are not properly configured to mask internal subnets, users on outside networks (such as the Internet) can read the private addresses.
  • Modems attached to network devices may be configured to accept incoming calls, thus opening security holes if they are not properly protected.
  • Dial-in access servers used remote staff may not be carefully secured and monitored.
  • Computers hosting very sensitive data may coexist on the same subnet with computers open to the general public.

  • The alpaka conects his pc to a router using an ethernet cable
  • The beaver tells him thier network uses a public line so it vulnerable to eves dropping
  • The crocodile proposes the use a hub instead of a router
  • The dragon connects last after everyone on the hub but, One port is still empty
  • the Elephant looks at his screen all the is maxed out subnet mask on his screen
  • The Fox takes a call on his whatsapp while all of this is going on
  • The Girrafe is not at the home and Dails in (vid call to see every one)
  • In the back of all of this the Hippo is strungulling to fix the house server
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the risks associted with protocols and software?

A
  • TCP/IP contains several security flaws. For example, IP addresses can be falsified easily or TCP requires only weak authentication.
  • Trust relationships between one server and another may allow a cracker to access the entire network because of a single flaw.
  • Network operating system software typically contains “backdoors” or security flaws. Unless the network administrator performs regular updates, a cracker may exploit these flaws.
  • If someonce access the comant prompt the could run hamful commands to damage the operating system.
  • Administrators might accept the default security options after installing an operating system or application.

  • Curry complaning that there is too many defensive flaws in the team
  • KD says the only way to improve defence is throught trust
  • Klay says the best way is to update the defence strategy
  • Dramon green selling the defence tacktics in the back to ant
  • Ant accepting the defence tacktics like is the gospel truth
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the network security risk associated with Internet access

A
  • Firewalls: A poorly configured firewall may fail to block unauthorized data packets from the internet.
  • Hackers: Hackers can gather user ID information from online forms, mailing lists, or newsgroups.
  • Flashing: During online chat sessions, attackers can send commands that disrupt the user’s screen (flashing attacks).
  • DOS: Denial-of-service (DoS) attacks can overload a system with too much traffic, making it unusable.
  • Updates: Failing to do updates regularly makes systems more vulnerable to attacks.

Acronym: FFUHD

Firewalls
Flashing
Updates
Hackers
DOS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly