LO3 Flashcards
How can you mitigate risks?
Testing systems and networks for vulnerabilities
What are assets?
Hardware, software, communication equipment, information and data
What is a ‘back door’
Method by which a programmer or network manager bypasses the normal security procedures
What is cost/benefit
The cost of implementing security against the benefits that it would bring
How can you protect vulnerabilities
Put measures in place to protect assets
What are examples of hardware assets
Servers, printers, scanners and computers
What are examples of software assets
Word processors, spreadsheets, CRM, financial packages
What is risk management
Taking steps to monitor the system or network to identify its weaknesses or vulnerabilities and put in place sufficient and appropriate measures to reduce or eliminate the risk
What is a patch deployment
Software issues are identified and reported. Hot fixes are designed to remove the vulnerability
What is manual remediation
Instead of using automated tools, technician or network manager will take steps to remove or reduce the vulnerability
What are automated tools
Tools that identify and repair vulnerabilities without the intervention of the technician or network manager
What is vulnerability
testing
Identification of a list of vulnerabilities that can be prioritised in order of severity
What is penetration testing
A software tool that tests a compute system/network to identify vulnerabilities that could be exploited by a hacker
What is fuzzing
Fuzzing is used to identify coding errors and security loopholes in software, operating systems and networks.
What does fuzzing involve
Inputting huge amounts of random data in an attempt to make the system crash