Chapter 11: It's a network Flashcards
What are 4 types of security threats?
11.2.1.2
Hardware threats
Environmental threats
Electrical threats
Maintenance threats
What is a Hardware Threat?
11.2.1.2
physical damage to servers, routers, switches, cabling plant, and workstations
What is a Environmental Threat?
11.2.1.2
Temperature extremes (too hot or too cold) or humidity extremes (too wet or too dry)
What is a Electrical threats Threat?
11.2.1.2
Voltage spikes, insufficient supply voltage (brownouts), unconditioned power (noise), and total power loss
What is a Maintenance Threat?
11.2.1.2
Poor handling of key electrical components (electrostatic discharge), lack of critical spare parts, poor cabling, and poor labeling
What are Network Security Factors?
11.2.1.3
vulnerability
threat
attack.
What are 3 types of attacks?
11.2.2.1
viruses
Trojan horses
worms.
What are 3 stages of anatomy of a worm attack
11.2.2.1
The enabling vulnerability
Propagation mechanism
Payload
What are 3 types of malicious code attacks
11.2.2.2
Reconnaissance attacks
Access attacks
Denial of service
What is a Reconnaissance attacks
11.2.2.2
The unauthorized discovery and mapping of systems, services, or vulnerabilities
What is an Access attacks
11.2.2.2
The unauthorized manipulation of data, system access, or user privileges
What is an Denial of service
11.2.2.2
The disabling or corruption of networks, systems, or services
What are the 4 steps to mitigate a worm attack (must be in correct order)
11.2.3.1
Containment
Inoculation
Quarantine
Treatment
What is Containment in a worm attack
11.2.3.1
Contain the spread of the worm within the network. Compartmentalize uninfected parts of the network.
What is Inoculation in a worm attack
11.2.3.1
Start patching all systems and, if possible, scanning for vulnerable systems.