DV Chapter 16 Flashcards
Types of threats
Information Theft
Data Loss and Manipulation
Identity Theft
Disruption of Service
Types of Vulnerabilities
Technological Vulnerabilities
TCP/IP protocol weakness
Operating System Weakness
Network Equipment Weakness
Configuration Vulnerabilities
Unsecured User account
System accounts with easily guessed passwords
Misconfigured internet services
Unsecured default settings within products
Misconfigured network equipment
Policy Vulnerabilities
Lack of written security
Politics
Lack of authentication continuity
Logical access controls not applied
Software and hardware installation and changes do not follow policy
Disaster recovery plan is non existent
Four Classes of Physical threats
Hardware
Environmental
Electrical
Maintenance
Types of Malware
Virus
Worms
Trojan Horses
Different types of Reconnaissance Attacks
Internet Queries
Ping Swap
Port Scan
Access Attacks
Password Attacks Brute-force Trojan horse Packet Sniffers Trust Exploitation Port Redirection Man-in-the-Middle
Denial of Service Attacks
DoS
Attack sends to much info to a server
DDoS
Attacker programs other peoples computers to send the ping