Day 11 - Network Security Concepts Flashcards
Solve for the security term based on the description:
A weakness in a system or its design that could be exploited by a threat
Vulnerability
Solve for the security term based on the description:
Anything of value to the organization, including people, equipment, resources and data
Assets
Solve for the security term based on the description:
A potential danger to a company’s assets, data or network functionality
Threat
Solve for the security term based on the description:
A mechanism that takes advantage of a vulnerability
Exploit
Solve for the security term based on the description:
The process of taking countermeasures to reduce the likelihood or severity of a potential threat or risk
Mitigation
Solve for the security term based on the description:
The likelihood of a threat exploiting the vulnerability of an asset, with the aim of negatively affecting an organization
Risk
An __________ vector is a path by which a threat actor can gain access to a server, host, or network
Attack (vector)
Data loss or data __________ occurs when data is intentionally or unintentionally lost, stolen or leaked to the outside world
Exfiltration
Solve for the data loss vector term based on the description:
Intercepted email or IM messages could be captured and reveal confidential information
Email/Social networking
Solve for the data loss vector term based on the description:
If data is not stored using encryption algorithm, the thief may be able to retrieve valuable confidential information
Unencrypted devices
Solve for the data loss vector term based on the description:
Sensitive data can be lost if access to the cloud is compromised due to weak security settings
Cloud storage devices
Solve for the data loss vector term based on the description:
An employee could perform an unauthorized transfer of data to a USB drive or a USB drive containing valuable data could be lost
Removable media
Solve for the data loss vector term based on the description:
Confidential data should be shredded when no longer required
Hard copy
Solve for the data loss vector term based on the description:
Passwords or weak passwords that have been compromised can provide a threat actor with easy access to corporate data
Improper access control
Solve for the pen testing tool term based on the description:
These types of tools are often referred to as password recovery tools and can be used to crack or recover a password. These tools repeatedly make guesses in order to crack a password
Password crackers
Solve for the pen testing tool term based on the description:
These types of tools are used to intentionally hack into a wireless network to detect security vulnerabilities
Wireless hacking tools
Solve for the pen testing tool term based on the description:
These types of tools are used to probe network devices, servers and hosts for open TCP and UDP ports
Networking scanning and hacking tools
Solve for the pen testing tool term based on the description:
These tools are used to probe and test a firewall’s robustness using specially forged packets
Packet crafting tools
Solve for the pen testing tool term based on the description:
These tools are used to capture and analyze packets in traditional Ethernet LAN or WANs
Packet sniffers
Solve for the pen testing tool term based on the description:
This is a directory and file integrity checker used by white hats to detected installed rootkits
Rootkit detectors
Solve for the pen testing tool term based on the description:
These tools are used by white hat hackers to sniff out any trace of evidence existing in a computer
Forensic tools
Solve for the pen testing tool term based on the description:
These tools are used by black hats to reverse engineer binary files when writing exploits. They are also used by white hats when analyzing malware
Debuggers
Solve for the pen testing tool term based on the description:
These are specially design operating systems preloaded with tools optimized for hacking
Hacking operating systems
Solve for the pen testing tool term based on the description:
These tools use algorithms schemes to encode data to prevent unauthorized access to the encrypted file
Encryption tools