Chapter 10 Security Flashcards
What are two types of Security Threats?
10.0.1.1
Internal threats - Users and employees who have access to data, equipment, and the network
External threats - Users outside of an organization who do not have authorized access to the network or resources
What are two types of attacks?
10.0.1.1
Physical - Events or attacks that steal, damage, or destroy equipment, such as servers, switches, and wiring
Data - Events or attacks that remove, corrupt, deny access to authorized users, allow access to unauthorized users, or steal information
What are four types of security threats that infect your computer?
10.1.1.1
Adware
Spyware
Grayware
Phishing
What is Adware?
10.1.1.1
Adware is a software program that displays advertising on your computer. Adware is usually distributed with downloaded software.
What is Spyware?
10.1.1.1
Spyware is installed and running, it monitors activity on the computer. The spyware then sends this information to the individual or organization responsible for launching the spyware.
What is Grayware?
10.1.1.1
Grayware may be malicious and is sometimes installed with the user’s consent. For example, a free software program may require the installation of a toolbar that displays advertising or tracks a user’s website history.
What is Phishing?
10.1.1.1
Phishing is where the attacker pretends to represent a legitimate outside organization, such as a bank. A potential victim is contacted via email, telephone, or text message.
What is Denial of Service (DoS)?
10.1.1.6
DoS works by sending so many requests for a system resource that the requested service is overloaded and ceases to operate
What is Distributed DoS (DDoS)?
10.1.1.6
A DDoS attack uses many infected computers, called zombies or botnets, to launch an attack. The intent is to obstruct or overwhelm access to the targeted server
What is a SYN Flood?
10.1.1.6
A SYN request is the initial communication sent to establish a TCP connection. A SYN flood attack randomly opens TCP ports at the source of the attack and ties up the network equipment or computer.
What is Spoofing?
10.1.1.6
In a spoofing attack, a computer pretends to be a trusted computer to gain access to resources. The computer uses a forged IP or MAC address
What is Man-in-the-Middle?
10.1.1.6
An attacker performs a Man-in-the-middle attack by intercepting communications between computers to steal information transiting through the network. A Man-in-the-middle attack could also be used to manipulate messages and relay false information between hosts
What is Replay?
10.1.1.6
To perform a replay attack, data transmissions are intercepted and recorded by an attacker. These transmissions are then replayed to the destination computer. The destination computer handles these replayed transmissions as authentic and sent by the original source.
What is DNS Poisoning?
10.1.1.6
DNS records on a system are changed to point to imposter servers. The user attempts to access a legitimate site, but traffic is diverted to an imposter site. The imposter site is used to capture confidential information
What is Social Engineering?
10.1.2.1
Social engineering occurs when an attacker tries to gain access to equipment or a network by tricking people into providing the necessary access information