Module 9: Managing a Secure Network Flashcards
It is a risk management process that include monitoring behaviors and habits on social media sites as well as discouraging employees from sharing login credentials via email or text message.
operations security
It is a risk management process that encourages managers to view operations from the perspective of an adversary in order to protect sensitive information from falling into the wrong hands.
operations security
Types of Network tests
- Penetration testing
- Network scanning
- Vulnerability scanning
- Password cracking
- Log review
- Integrity checks
- Virus detection
A type of network test where the objective is to identify security weaknesses.
Penetration testing
A type of network test which is the practice of testing a computer system, network or web application to find security vulnerabilities that an attacker could exploit.
Penetration testing
A type of network test which can also be used to test an organization’s security policy, its adherence to compliance requirements, its employees’ security awareness and the organization’s ability to identify and respond to security incidents.
Penetration testing
A type of network test which is the process allowing you to determine all active devices on your network.
network scanning
_____________ is when the tool sends a ping to each device on the network and awaits a response.
active scanning
A type of network test which aims to identify any systems that are subject to known vulnerabilities.
vulnerability scanning
It is an application that identifies and creates an inventory of all the systems (including servers, desktops, laptops, virtual machines, containers, firewalls, switches, and printers) connected to a network.
vulnerability scanner
A type of network test which is the art of obtaining the correct password that gives access to a system protected by an authentication method.
password cracking
A type of network test which is the process of attempting to gain Unauthorized access to restricted systems using common passwords or algorithms that guess passwords.
password cracking
A type of network test that works by reading your entire disk and recording integrity data that acts as a signature for the files and system sectors.
Integrity checks
A type of network test that provide the only reliable way to discover what damage a virus has done.
Integrity checks
Network Testing Tools
- Nmap/Zenmap
- SuperScan
- SIEM
- GFI LANguard
- Tripwire
- Nessus
- L0phtCrack
- Metasploit
A network testing tool which is a multi-platform free and open source application which aims to make Nmap easy for beginners to use while providing advanced features for experienced Nmap users.
zenmap
A network testing tool which is the official Nmap Security Scanner GUI.
zenmap
A network testing tool which includes a variety of additional networking tools such as ping, traceroute, HTTP HEAD, and whois.
superscan
A network testing tool which is a free Windows-only closed-source TCP/UDP port scanner by Foundstone.
superscan
A network testing tool that ingests log and event data from a wide variety of sources such as security software and appliances, network infrastructure devices, applications, and endpoints to give IT security teams a centralized tool for spotting and responding to security incidents.
SIEM (Security Information and Event Management)
An essential function of SIEM that focuses primarily on collecting, examining, and analyzing network traffic.
forensic analysis
An essential function of SIEM is the process of moving data and log files from disparate sources into a common repository.
aggregation
An essential function of SIEM that tells your SIEM system which sequences of events could be indicative of anomalies which may suggest security weaknesses or cyber attack.
correlation
An essential function of SIEM which refers to the regular archiving of event logs, particularly those significant to cyber security.
retention
What are the groups that the End user policy can be divided to?
- customer
- employee
- partner
Who are the audiences for security policy?
- manager
- end user
- engineer
What are the contents of a security policy documents?
- procedures
- standards
- guidelines
What are the primary components of security awareness program?
- Awareness campaigns
- Training and education