Module 1: Introduction to Network Security Flashcards
What is a vulnerability?
Weakness in the network and/or its protocol.
What is a threat?
A set of circumstances that has the potential to cause harm.
What is intrusion?
Any act or event that compromises the information on a network.
What is a breach?
Breakdown of security of the network
What is an interruption intrusion and what is an example?
- Making access to a resource become unavailable
- Denial of service
What is an interception intrusion and what is an example?
- Gaining unauthorized access to information
- Eaves dropping / sniffing
- Traffic analysis
What is a modification intrusion and what is an example?
- Tampering with a resource or information and changing it.
- Man in the middle (MITM)
What is a fabrication intrusion and what is an example?
- Insertion of counterfeit objects into a system
- Malware
What is an invasion intrusion and what is an example?
- Taking control of a resource and steal information
- Session hijacking
What is active eavesdropping?
Send data probes & collect info
What is passive eavesdropping?
Silent eavesdropping - no probes
What is a Level 0 intrusion?
Normal system users - no intrusion
What is a Level 1 intrusion?
Intrusion occurs, but no evidence of damage and no trail is left.
What is a Level 2 intrusion?
Intrusion occurs, but no evidence of damage but a trail is left.
What is a Level 3 intrusion?
Files are damaged, programs and/or data are altered (e.g. Malware, MITM attack).
What is a Level 4 intrusion?
Services disrupted (e.g. DoS)
What is a Level 5 intrusion?
Valuable information is stolen - cyber espionage cyber felony is committed.
What are the four steps for a hacker to commit an attack?
- Gather information
- Look for vulnerabilities
- Get access to the network
- Launch the attack
What type of information is useful for a hacker to gather information?
- Domain names
- IP addresses
- Active ports
- OS/CPU
- Type of firewalls
- Social engineering