14.1 Network Threats Flashcards
Describe (AAA) Authentication Authorization Accounting
describes the three components that are used to protect network access and communications.
Authentication is the act of identifying a network user (i.e., asking for a username and password).
Authorization is permitting or denying of network resources (e.g., allowing users to access files or commands needed to perform their specific role, but denying access to everything else).
Accounting is the process of documenting user actions and collecting user data (e.g., how many resources the user uses, which files the user accesses, etc.).
Describe TACACS+
refers to a family of related protocols handling remote authentication and related services for networked access control through a centralized server
Describe (RADIUS) Remote Authentication Dial-in User Service
RADIUS is used by Microsoft servers for centralized remote access administration.
Describe a Threat actor
a person or organization that poses a threat to an organization’s security. This can be an internal or an external threat. Some threats aren’t even malicious; they can be caused by internal negligence.
Describe a White Hat hacker
This is a skilled hacker who uses skills and knowledge for defensive purposes only. White hat hackers interact only with a system that they have explicit permission to access. These are the ethical hackers.
Describe Black hat Hacker
This hacker is also very skilled, but uses knowledge and skills for illegal or malicious purposes. A black hat is also known as a cracker. These hackers are highly unethical.
Describe Gray Hat Hacker
The gray hat hacker falls in the middle of the white hat and black hat hackers. The gray hat may cross the line of what is ethical, but usually has good intentions and isn’t being malicious like a black hat hacker.
Describe Suicide Hacker
A hacker who is concerned only with taking down the target for a cause. This hacker has no concern with being caught or going to jail. The only concern is the cause.
Describe Cyber Terrorist
This hacker is motivated by religious or political beliefs and wants to cause severe disruption or widespread fear.
Describe State Sponsored Hacker
A hacker who works for a government and attempts to gain top-secret information by hacking other governments.
Describe Hacktivist
A hacker whose main purpose is to protest and get views and opinions out there. Hacktivists often deface websites or use denial-of-service attacks.
Describe Script Kiddie
This person is extremely unskilled and uses tools and scripts that real hackers have developed.
Describe an Advanced Persistent Threat
a stealth attack that gains access to a network or computer system and remains hidden for an extended period of time.
Describe Threat Modeling
the process of analyzing the security of the organization and determining security holes
Describe Active attack
Active attacks are a perpetrator’s attempt to compromise or affect the operations of a system in some way. For example, a brute force root password attack on a web server is an active attack. A distributed denial of service (DDoS) attack is also an active attack.