IA 2 - UNIT 4 Flashcards
Focuses in protecting computers, networks, program and data from unintended or authorized access, change or destruction.
Cybersecurity
is the environment in which communication over computer networks occurs
Cyberspace
3 Features of Security
- confidentiality
- integrity
- availability
is a crime that involves computer, the network that may been used in the commission of a crime or it may be the target
Cybercrime
It includes cybersquatting, cybersex, child pornography, identity theft, illegal access to data and libel..
CybercrimePrevention Act of 2012,
officially recorded as Republic Act No. 10175
Types of Malwares
- trojan
- virus
- worm
- spyware
- ransomare
- adware
- rootkit
- keylogger
- remote access
SECURITY TOOLS
- Network Security Monitoring
- Encryption
- Web Vulnerability Scanning
- Penetration Testing
- Packet Sniffers And Password Auditing
identifying intrusions and detecting threats from both outside and within the organization.
Network Security Monitoring
process of encoding a message or information in such a way that only authorized parties can access it and those who are not authorized cannot
Encryption
- software program which performs automatic black box testing on a web application and identifies security vulnerabilities.
- Scanners do not access the source code, they only perform functional testing and try to find security vulnerabilities.
Web Vulnerability Scanning
- also called pen testing or ethical hacking,
- is the practice of testing a computer system, network or web application to find security vulnerabilities that an attacker could exploit.
- So it can be automated with software applications or performed manually.
Penetration Testing
7 Best Cyber Security Penetration Testing Tools
- metasploit
- nmap
- wireshark
- aircrack-ng
- John the Ripper
- Nessus
- Burpsuite
- It is a small program that listens to all traffic in the attached network(s), builds data streams out of TCP/IP packets,
- and extracts user names and passwords from those streams that contain protocols that send clear text passwords.
Packet Sniffers And Password Auditing
Security Devices
- Video Management Platforms
- Video Surveillance
- Video Recording Devices
- Intrusion detection system (IDS)
- Intrusion prevention systems (IPS)
- Access Control Devices
- Firewalls
- Unified Threat Management
- Antivirus
surveillance systemcapable of capturing images andvideosthat can be compressed, stored or sent over communication networks
Video Surveillance
Records and stores recorded footages
Video Recording Devices
- a device or software application that monitors a network for malicious activity or policy violations.
- Any malicious activity or violation is typically reported or collected centrally using a security information and event management system
Intrusion
detection system (IDS)
- a network security device that can not only detect intruders, but also prevent them from successfully launching any known attack.
- combine the abilities of firewalls and intrusion detection systems.
Intrusion prevention systems
- They prevent access to sensitive resources.
- For high protection of properties and resources, possession of well-designed and technically sound access control devices has become a trend
Access Control Devices
- It is a network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules.
- have been a first line of defense in network security for over 25 years.
Firewalls
- It is a category of security appliances which integrates a range of security features into a single appliance.
- appliances combine firewall, gateway anti-virus, and intrusion detection and prevention capabilities into a single platform.
Unified Threat Management
Also known as anti-malware, it is a computer program used to prevent, detect and remove malware
Antivirus
In securing one’s systems,
actions must be taken in three
areas
- prevention
- detection
- response
involves those actions taken to discover failures in prevention (realizing that 100% prevention is never possible);
detection
involves all those actions one must take to attempt to prevent unauthorized access to a system
PREVENTION
is generally considered to include recovery measures, but might also include efforts to uncover what has been done to the system in the attack and how it was done
Response
Types of Intrusion
- PHYSICAL INTRUSION
- TARGET INTRUSION
- RANDOM INTRUSION