Module 15: Security considerations Flashcards
this includes:
re-formatting a hard drive or changing data such as the price of an item
describe
data loss and manipulation
describe a
TCP half open
this is where a server sends a SYN/ACK and is waiting for the ACK reply from the client
NOTE
while the server is in this state memory is consumed as well as network resources since multiple SYN/ACKS will be sent by the server
A security tool that controls traffic to and from a network. based on rules
describe a
firewall
this is where a server sends a SYN/ACK and is waiting for the ACK reply from the client
NOTE
while the server is in this state memory is consumed as well as network resources since multiple SYN/ACKS will be sent by the server
describe a
TCP half open
name 2 common types of
Denial of Service (DoS)
these include:
- SYN (Synchronous) flooding
- ping of death
software is installed on an end-user workstation to detect and remove spyware and adware.
describe
anti-spyware software
Software is installed on an end-user workstation or server to identify and remove unwanted emails.
describe
spam blockers
describe
information theft
this involves:
stealing personal or propietary information that may then be sold on
describe
popup blocker
Software is installed on an end-user workstation to prevent popup and pop-under advertisement windows from displaying.
this is a DoS attack where:
a packet crafted that is larger than the 65,535 bytes that IP allows. these packets can cause a system to crash
describe briefly the
ping of death
describe
SYN (Synchronous) flooding
this DoS attack is composed of:
- an attacker crafs a TCP SYN packet with a fake source IP address
- the server tries responding to the TCP SYN with a TCP SYN/ACK
- because the source IP was fake the server is left waiting in a half open state, consuming memory and resources
- the server will send multiple SYN/ACKS to the fake address before it timesout
this DoS attack is composed of:
- an attacker crafs a TCP SYN packet with a fake source IP address
- the server tries responding to the TCP SYN with a TCP SYN/ACK
- because the source IP was fake the server is left waiting in a half open state, consuming memory and resources
- the server will send multiple SYN/ACKS to the fake address before it timesout
describe
SYN (Synchronous) flooding
this is an intruder who has or is attempting to gain access to a network in order to carry out an attack
describe a
threat actor
describe
identity theft
this includes:
stealing a persons personal information so that they may take on their identity and apply for credit, documents such as a pasport or make online transactions
the attacks they may undertake are:
- information theft
- data loss and manipulation
- identity theft
- distruption of service
name 4 types of attack a
threat actor
may undertake