12-3 Flashcards
___________ have built in firewalls capable of blocking certain ports
windows and Linux
Another phase of assessing systems security is protection. This means you need to ensure that all reasonable ____________ are being employed. this includes tools such as IDS.
protective software and devices
IDS are the only way to know of impending _________
attacks
___________ not only mask your internal IP address but most proxy servers allow you to discover what websites users visit and put on filters.
proxy serves
when assessing the protection of the network, check to see whether the following items are present
firewall AV protection Anti Spyware IDS Proxy Server or NAT Data transmission encryption
Physical security needs to be considered. Servers may be locked and secured at the end of the day but most computers are left ___________ at work.
unsecured
Backups should be stored in a fireproof safe, and old backups should be ______________
destroyed.
this room should be kept locked, in the most fireresistent room in the bldg. access should be restricted. access control and tacking should be in place.
server rooms
these should have an engraved ID mark. routinely inventory them. normally not physically possible to secure in place.
workstations
this is a process of scanning the well knows ports __________ or all ports _______ to see which ports are open.
1024 // 65535
this is a process whereby the attacker tries to find out what is on the target network.
enumerating
this is the use of some tool to seek out known vulnerabilities or the attacker might try to manually assess vulnerability.
vulnerability assessment
this scanner is not necessarily the most widely used, but it’s easy to use. its methodical but slow. you select an host IP you want to scan. this will search for open ports
Netcop scanner
a port scanner that provides additional information. it will give you open ports as well as other vital information
netbrute
widely used scanning utilities. available as a free download. simple and informative.
Cerberus