CPE 046 Flashcards
ıs a multıtaskıng operatıng
system used on most Cısco routers
and swıtches.
IOS (Internetwork Operatıng
System)
IOS
(Internetwork Operatıng
System)
ıs used to
confıgure routıng, swıtchıng,
ınternetworkıng and other features
supported by a Cısco devıce.
IOS
thıs type of access ıs usually used to confıgure newly
acquıred devıces. These devıces usually don’t have an IP address confıgured,
and therefore cannot be accessed through the network.
Console access
thıs type of access used to be a common way to access network devıces. ________ ıs a termınal emulatıon program that enables you to access IOS through the network and confıgure the devıce remotely. Uses
TCP port 23
Telnet access
– lıke Telnet, thıs access type enables you to confıgure devıces
remotely, but ıt adds an extra layer of securıty by encryptıng all
communıcatıons usıng publıc-key cryptography. SSH uses well known TCP
port 22.
SSH access
IOS Command Hierarchy
User EXEC COMMANDS
PRIVILEGED EXEC COMMANDS
Global Configuration Commands
Configuration Mode
Interface
Subinterface
Controller
Map-list
Map-class
line
router
ipx-router
route-map
is the practice of protecting systems,
networks, and programs from digital attacks.
Cybersecurity
The Pillars of Cybersecurity
Best Practices
Policies & Procedures
Products & Services
You set up a new network for a growing company, but you don’t
follow all of the recommended cybersecurity best practices. While you may have invested in robust security products, they can be easily subverted by _________________
failure to follow best practices.
or
Best practices
Examples: Acceptable use policies, employee training.
Failure Example: Deploying a content filter without training employees, leading to risky behavior.
Policies & Procedures:
Examples: Firewalls, antivirus software, maintenance subscriptions.
Failure Example: Skipping security service licenses, leaving systems vulnerable to zero-day attacks.
Products & Services:
Examples: Locking doors (analogous to securing networks), using strong passwords, updating firmware.
Failure Example: Installing robust security tools but using weak passcodes (e.g., “1234”).
Best practices
CIA TRIAD
Confidentiality
Integrity
Availability
Confidential information is kept secret to prevent: identity theft,
compromised accounts and systems, legal concerns, damage to
reputation, and other severe consequences.
Confidentiality
MFA
multifactor authentication
Data is one of the most valuable assets a company can have, but it is not static. It can be transferred to other systems, altered, and
updated multiple times.
Integrity
____________ guarantees that data is accurate, complete, and consistent.
Integrity
It covers data in storage, during processing, and in transit. Without data integrity, loss, corruption, or compromise can cause significant damage and financial loss for both businesses and customers.
Integrity
The two main types of data integrity are:
Physical data integrity
Logical data integrity
is the collection of actions and fail-safes that
protect the physical systems that store and process the data.
Physical data integrity
are the checks and protocols that protect data
from human error and hackers. These confirm that data is correct and
accurate as it’s used in different ways within an organization
Logical data integrity
means that authorized users have immediate and
reliable access to their data. This includes granting access to
authorized users with passwords and security questions.
Data availability or Availability
Some of the most fundamental threats to availability are non-
malicious, including:
hardware failures,
unscheduled software downtime,
network bandwidth issues.
NIST(National Institute of Standards and Technology) Cybersecurity Framework
Identity
Protect
Detect
Respond
Recover
what processes and assets need protection?
Identity
Implement appropriate safeguards to ensure protection of the enterprise’s assets
Protect
Implement appropriate mechanisms to identify the occurrence of cybersecurity incidents
Detect
Develop Techniques to contain the impacts of cybersecurity events
Respond
Implement the appropriate processes to restore capabillities and service impaired due to cybersecurity events
Recover
Weak security policies can lead to physical threats, tampering, or the
theft of hardware.
Hardware Threats
is the art of unlocking the lock by analyzing and manipulating the components of the lock device, without an original key.
Lock Picking
Threats and Breaches
Hardware Threats
Data Threats
Data Leaks & Data Breaches
Data Dumps
Dumpster Diving
Software Threats
- Unpatched systems, misconfigured firewalls, weak cybersecurity, and
weak physical security are just a few ways that data threats occur - Data Leaks & Data Breaches.
- Data Dumps
- Dumpster Diving
Data Threats
are the accidental exposure of confidential or sensitive
data through a security vulnerability.
Data leaks
are when a data leak is caused intentionally by a
cybercriminal. These occur when social engineering or phishing
attacks trick employees into leaking sensitive credentials or
information.
Data breaches
are when cybercriminals dump (release) stolen data onto
the dark web for monetary gain.
Data Dumps
is the act of physically searching through a literal
dumpster to find something valuable.
Dumpster diving
Tech companies require ______________________ as a normal part of business because these can be stolen from the
trash to harvest data that can be used for identity theft and data
breaches, or the data could be sold to hackers, or a company’s
competitors.
document shredding and device destruction
include theft, exploits, and malware.
Software Threats
is the unauthorized copy or use of
copyright-protected software. This includes pirating software and
counterfeiting activation codes.
Software or license theft
are pieces of code that use vulnerabilities in hardware or
software to get into a system.
Exploits
Malware-infected websites use exploits
to automatically download malware to a system. This is called _______
drive by download.
Malware
Malicious Software
is a general term for software designed to compromise
computer systems. Malware can cause system slowdowns, odd
requests, browser misdirection, popup ads.
Malware
It can also steal data, record everything you do with or near your device, spam your contacts with infected links, and connect your computer to a network of hijacked computers that are remotely controlled (known as a ______).
Malware
botnet
Malware can come from:
- attachments
- sketchy websites
- file downloads
- infected USB drives
- links in emails, ads, social media, torrents, and even text messages
Malware Types
Program viruses
Macro viruses
Stealth viruses
Polymorphic viruses
Worms
Trojans
Spyware
Adware
Ransomware
are bits of code that insert themselves into another
program.
Program viruses
affect Microsoft Office files via the macros they use to
automate tasks.
Macro viruses
copy themselves to different locations to avoid antivirus
scans.
Stealth viruses
change their characteristics to get around cybersecurity defenses. 97% of all malware uses polymorphic viruses.
Polymorphic viruses
start themselves after identifying system weaknesses. They don’t
rely on apps or files. Unlike other viruses, worms can be controlled
remotely. A computer worm replicating itself aims to make copies that can infect other computers. While most malware is isolated to the infected device, worm viruses are designed to spread to other devices.
Worms
trick you into installing legitimate-seeming software that
includes harmful malware.
Trojans
collects personal data, login credentials, credit card information, online activity, and can record using a device’s camera or microphone.
Spyware
is software coded into online ads that records your personal
data, website visits, and keystrokes to send you personalized ads. Both
adware and spyware can be legitimate or malicious.
Adware
locks a system, encrypts its files, and displays a ransom demand. To get the encryption key you must pay the ransom, or you can regain access by doing a full system restore from a backup.
Ransomware
EICAR
The European Institute for Computer Antivirus Research
The European Institute for Computer Antivirus Research
(EICAR) has developed a test virus to test your antivirus
solution. This script is an inert text file. The binary
pattern is included in the virus pattern file from most
antivirus vendors. The test virus is not a virus and does
not contain any program code.
Sample Virus