10.2 Flashcards
I am altering Janice records on a deer a server at attacker can redirect in that traffic for legitimate Web server to a fishing website which is called – – – – – – or – – – – – –
DNS poisoning or DNS spoofing
What are the following certain characteristics of malware that can make it hard to detect
Encryption
Stealth
Polymorphism
Time dependence
This evaluate threats to and vulnerabilities of the net work
Security risk assessment
This evaluates the impact of potential threats or business processor
Business risk assessment
This is a series of steps that accomplishes define goal
A business process
From the IT perspective than a blank blank blank blank blank ensures that you and other responsible for network security understand your company’s business processes which will help you minimize the impact of security threats all those processes
Process assessment
This evaluate security in compliance related to suppliers in vendors and company does business with
Vendor risk assessment
This is a thorough examination of each aspect of the networks to determine how it might be compromised
Posture assessment
This identify specific security threats to the net work and related risk factors
Threat assessment
This is used to identify vulnerabilities Internet work so often performed by companies on employees and does not attempt to exploit any vulnerabilities
Vulnerability assessment
This team attempts to conduct the attack
Red team
——— team attempt to defend the net work
Blue
This team consist of a hired hacker such as a consultant or security organization
Red team
Team consist of the companies on IT security another staff
Blue team
This team is in charge of offensive security vulnerability assessment social engineering penetration testing
Red team