TEST 1 Flashcards
(30 cards)
- If an attacker has physical access to a cable he/she can simply tap that cable and see all the data passing through the cable
Network eavesdropping
This is applied to control which computers can connect to the network. With this technology, it provides a list of acceptable MAC addresses to WAP
MAC ADDRESS FILTERING
It is used for building a local network that uses a standard communication protocol that is embedded in soft software devices.
ETHERNET NETWORK
A management and control protocol for IP. It delivers messages between hosts about the health of the network.
ICMP
It compares received traffic to a set of rules that define which traffic it will permit to pass through the firewall
PACKET FILTERING
This is responsible for maintaining communication between computers. It creates, maintains, and disconnects communication that takes place between processors over a network.
SESSION LAYER
It is a gathering of information about a network for use in future attacks.
NETWORK RECONNAISSANCE
It is a suite of protocols designed to connect sites securely
IPSEC
It is subject to direct attack from an outside source. Multi Layered defense is far more secure. The lone defense router can protect internal resources but is subject to attack itself.
BORDERS ROUTERS
This is responsible for transmitting information on computers connected to the same local area network (LAN). Device manufacturers assign each hardware device to a unique MAC address
DATA LINK LAYER
Attack to overwhelm a server or network segment to the point it becomes unusable
DENIAL OF SERVICE
The PC operating system was disk-based, or DOS, and most software and data files migrated between PCs via floppy diskettes
1980s
The attacker might issue a command to access a file on a local or network drive and modify, delete, or overwrite it with new data
DATA MODIFICATION
Attackers conduct direct attacks against specific targets such as specific organizations
DIRECT ATTACK
A program triggers such nuisances as pop-up ads and banners.
ADWARE
Economic damage or loss to the theft, destruction, or unauthorized manipulation of sensitive data
ATTACK AGAINST DATA INTEGRITY
An executable program that attaches to or infects another executable program.
VIRUS
It is a technical-sounding warning of serious vulnerabilities or damage.
THREAT
Research made early attempts to perform routine maintenance tasks on large networks using self-distributing code
1970s
Malicious code attacks can broadcast sensitive information about a company or its customers
ATTACK THAT DAMAGE REPUTATION
Is a deliberate system of principles to guide decisions and achieve rational outcomes
POLICIES
The court’s right to hear a case of a wrong is committed in its territory or involves its citizenry
JURISDICTION
The organizations must be able to demonstrate that the employees agreed to comply with the policy through act or affirmation
COMPLIANCE
Comprises a wide variety of laws that govern a nation or state and deals with the relationships and conflicts between organizational entities and people.
CIVIL LAW