Module 2: Securing Networks Flashcards
Maintains the interactive Cyberthreat Real-Time Map display of current network attacks.
Kapersky
It relates directly to the business continuity of an organization. Breaches can disrupt e-commerce, cause the loss of business data, threaten people’s privacy, and compromise the integrity of information.
Network security
Many tools help network administrators adapt, develop, and implement threat mitigation techniques.
Two examples are:
Cisco Talos Intelligence Group website
Cisco Product Security Incident Response Team (PSIRT)
A path by which a threat actor can access a server, host, or network.
Attack vector
Originate from inside or outside the corporate network.
Attack Vectors
An internal user, such as an employee, can accidentally or intentionally:
*Steal and copy confidential data to removable media, email, messaging software, and other media.
* Compromise internal servers or network infrastructure devices.
* Disconnect a critical network connection and cause a network outage.
* Connect an infected USB drive to a corporate computer system.
The most common vector for data loss includes instant messaging software and social media sites. For instance, intercepted email or IM messages could be captured and reveal confidential information.
Email/Social Networking
A stolen corporate laptop typically contains confidential organizational data. The thief can retrieve valuable personal data if the data is not stored using an encryption algorithm.
Unencrypted Devices
Saving data to the cloud has many potential benefits. However, sensitive data can be lost if access to the cloud is compromised due to weak security settings
Cloud Storage Devices
One risk is that an employee could perform an unauthorized transfer of data to a USB drive. Another chance is that a USB drive containing valuable corporate data could be lost.
Removable Media
Corporate data should be disposed of thoroughly. For example, confidential data should be shredded when no longer required. Otherwise, a thief could retrieve discarded reports and gain valuable information.
Hard Copy
Passwords are the first line of defense. Stolen passwords or weak passwords which have been compromised can provide an attacker easy access to corporate data.
Improper Access Control