cyber security Flashcards
network analytics does what
improve security
fine tunes network performance
predicts trends
preform forensic investigation
net work analytics are most useful to organizations with
complex networks
overtaxed networks
networks that have high level security
SQL injection
occurs on data base driven websites/allows tables to be edited or deleted
cyber attack results in
reputation damage
financial/business loss
data loss
how many times do attacks attack
every 39 seconds
different types of cybercrime
computer target of crime
computer assisted crime
target idetical to crime
integrity
data can only be added altered or removed by a authorized party
Sony’s PlayStation attack
affected 77 million users and stopped them from using services for 23 days
domains of cyber security
asset security
identity and access management
asset security
communication network security
Adam Botbyl
stole credit score information
davis L Smith
created melissa virus
cyber terrorist
someone who attacks for political/religious reasons. usually inflicts fear with large scale disruption
hactivist
someone who promotes political agenda by defacing a website
the CEH consist of
network/info background
procedure methology
security
ethics
areas of penetration hacking
network services
web applications
social engineering
wireless
client side