Network Security Flashcards
A person, device, location, or information that SecOps aims to protect from attack
Asset
An action taken by a threat that exploits a vulnerability that attempts to either block authorized access to an asset, or to gain unauthorized access to an asset.
Attack
The potential of a threat to exploit a vulnerability via an attack.
Risk
The abbreviation for IT security operations; a discipline within IT responsible for protecting assets by reducing the risk of attacks.
SecOps
Something or someone that can exploit a vulnerability to attack an asset.
Threat
A weakness in software, hardware, facilities, or humans that can be exploited by a threat.
Vulnerability:
is an indispensable tool for detecting vulnerabilities within servers, computers, and network devices. can be cloud-based or may be installed as a software application on your laptop or a dedicated security server
vulnerability scanner
It is important to regularly run these scanners within your network for early identification and mitigation of new vulnerabilities.
The best electronic security in the world will not help you if your physical security is weak. Even the best encryption on the market today can be eventually overcome through sheer brute force methods of trying key after key until one finally unlocks your secrets.
Poor Physical Security Measures.
you need to protect your assets with both physical and electronic security measures.
*Poor Physical Security Measures
*Weak Passwords or Using Default Passwords
*Misconfigured Firewall Rules
*Personal Devices Within the Network
*Advanced Persistent Threats
*Zero-Day: Protecting Against the Unknown
some common vulnerabilities
the virus or malware remains undetected while it sits idle for long periods, perhaps months, just waiting for the right time
advanced persistent threat (APT)
it is lying in wait for some preordained time or a trigger from an outside source, at which point it will unleash its attack
It sits idle long enough to ensure that it has been added to as many backups as possible so that even if you restore from backup, you have no choice but to comply with the attacker.
advanced persistent threat (APT)
is not yet known by the public, meaning there is no patch available to mitigate this vulnerability.
zero-day
*Vulnerability Testers
*Blue, Red, White, and Purple Teams
*Hackers: White Hat, Black Hat, and Gray Hat
*Insider Threats
*Nation States
*Script Kiddies
Attacker Types
responsible for scanning servers and network devices for known vulnerabilities
vulnerability tester
team attempts to compromise the security
red team
team defends
blue team
neutral team that observes the festivities and may even serve as referee.
white team
the red and blue team engage, and then when certain success criteria are met, the teams debrief, cross-train each other, and repeat
purple team
also known as an iterate and improve model
hackers are IT professionals who specialize in penetrating or compromising network security but only to help an organization improve its own security posture. only perform the attacks when authorized to do so; to the fullest extent possible, they remain in compliance with any and all laws governing such behavior.
white hat hackers
may or may not be IT professionals but possess the knowledge and will to breach systems for profit
black hat hackers