Chapter 3 - Network Security Concepts Flashcards
what is RISK
likelihood of a threat to exploit the vulnerability of an asset
probability of the occurrence of an event and its consequences
what is THREAT
a potential danger to a company’s assets, data or network functionality
what is data loss or data exfiltration
when data is intentionally or unintentionally lost, stolen or leaked to outside world
common data loss vectors
- email/social networking
- unencrypted devices
- cloud storage devices
- removable media
- hard copy
- improper access control (weak or compromised passwords)
what kind of hacker:
- commit crimes and may do unethical things but not for personal gain or to cause damage
- may disclose vulnerability to affected org
Grey Hat Hacker
term that includes any device, person, group or nation state that is intentionally or unintentionally the source of an attack?
threat actor
what is a vulnerability broker
usually a grey hat hacker who attempts to discover exploits and reports them to vendors, sometimes for rewards
what type of attack does the threat actor rely on users to install to help exploit the security gaps
Malware
types of malware
- virus
- Trojan horse
- Adware
- Ransomeware
- rootkit
- spyware
- worm
networks are susceptible to these kinds of attacks
- reconnaissance attacks
- access attacks
- DoS attacks
techniques used by threat actors to conduct recon attacks
- perform an info query of a target
- initiate ping sweep of target network
- initiate a port scan of active IP addresses
- run vulnerability scanners
- run exploitation tools
access attacks exploits known vulnerabilities in…
authentication services, FTP services and web services
types of access attacks include
- social engineering
- password attacks
- spoofing attacks
- trust exploitations (threat actor uses unauthorized privileges to gain access to a system)
- port redirections
- MITM attack
- buffer overflow attacks
this tool was designed to help white hat hackers and other network security professionals create social engineering attacks to test their own networks
SET - Social Engineering Toolkit
what are the two types of DoS and DDoS attack
- overwhelming quantity of traffic
- maliciously formatted packets