Network Security Risk Flashcards
(4 cards)
1
Q
What are the network risks associated with People?
A
- Intruders or attackers using social engineering or snooping to obtain user passwords
- An administrator incorrectly creating or configuring user role and permission resulting in file and login access vulnerabilities
- Network administrators overlooking security mistakes in topology or hardware configuration
- Lack of proper documentation and communication of security policies, leading to intentional or un-intentional misuse of files or network access
- An unused computer or terminal being left logged onto the network, thereby providing an entry point for an intruder
- Users or administrators choosing easy-to-guess passwords
- Authorized staff leaving computer room doors open or unlocked, allowing unauthorized individuals to enter
- Staff throwing a way backup disk or storage in public dustbins
- Admins neglecting to remove acounts who have left the organization
- Users writing their passwords on paper, then placing the paper in an easily accessible place.
- Jon Jones snooping arround trying to user social engineering to steal ankaleav’s password as ankaleve is the ufc account admin
- Ankalaev is create other ufc fighters accounts and accidenly grants DDP an admin role and permissions
- DPP see ankalaev mistake and just overlooks the flaw
- JDM is mad that these errors happen and he gatthers every one to document and communicate the security policies
- Islam is in meeting with his computer but leaves it open
- volkanovski sees islam’s laptop open and gues his account passwor as password and it unlocks
- Pathoja leaves comes and see volkanovski the room and tells him to leave but then pantoja forgets to lock the door
- Francis is hungry and searches the dustbins while there he finds a hard drive
- Adesanya ask him for the hard drive as he knows he can access it becauser the ufc did not delete his account when they fired him
- Usman comes out the bin and tells adensanya there is not need he already found a password on the paper
2
Q
What are the securiy risk associated with hardware and Network Desing?
A
- Wireless and wire-based transmissions can often be intercepted.
- Networks that use leased public lines, the Internet, are vulnerable to eavesdropping.
- Network hubs broadcast traffic over the entire segment, thus making transmissions more widely vulnerable to sniffing.
- Unused routers, ports can be exploited and accessed by crackers if they are not disabled.
- If routers are not properly configured to mask internal subnets, users on outside networks (such as the Internet) can read the private addresses.
- Modems attached to network devices may be configured to accept incoming calls, thus opening security holes if they are not properly protected.
- Dial-in access servers used remote staff may not be carefully secured and monitored.
- Computers hosting very sensitive data may coexist on the same subnet with computers open to the general public.
- The alpaka conects his pc to a router using an ethernet cable
- The beaver tells him thier network uses a public line so it vulnerable to eves dropping
- The crocodile proposes the use a hub instead of a router
- The dragon connects last after everyone on the hub but, One port is still empty
- the Elephant looks at his screen all the is maxed out subnet mask on his screen
- The Fox takes a call on his whatsapp while all of this is going on
- The Girrafe is not at the home and Dails in (vid call to see every one)
- In the back of all of this the Hippo is strungulling to fix the house server
3
Q
What are the risks associted with protocols and software?
A
- TCP/IP contains several security flaws. For example, IP addresses can be falsified easily or TCP requires only weak authentication.
- Trust relationships between one server and another may allow a cracker to access the entire network because of a single flaw.
- Network operating system software typically contains “backdoors” or security flaws. Unless the network administrator performs regular updates, a cracker may exploit these flaws.
- If someonce access the comant prompt the could run hamful commands to damage the operating system.
- Administrators might accept the default security options after installing an operating system or application.
- Curry complaning that there is too many defensive flaws in the team
- KD says the only way to improve defence is throught trust
- Klay says the best way is to update the defence strategy
- Dramon green selling the defence tacktics in the back to ant
- Ant accepting the defence tacktics like is the gospel truth
4
Q
What are the network security risk associated with Internet access
A
- Firewalls: A poorly configured firewall may fail to block unauthorized data packets from the internet.
- Hackers: Hackers can gather user ID information from online forms, mailing lists, or newsgroups.
- Flashing: During online chat sessions, attackers can send commands that disrupt the user’s screen (flashing attacks).
- DOS: Denial-of-service (DoS) attacks can overload a system with too much traffic, making it unusable.
- Updates: Failing to do updates regularly makes systems more vulnerable to attacks.
Acronym: FFUHD
Firewalls
Flashing
Updates
Hackers
DOS