Objective 3a Flashcards
What are the primary network threat categories?
Unstructured Threats, Structured Threats, Internal Threat, External Threat
Unfocused attacks on one or more network systems
Unstructured Threats
Focused by one or more individuals with high skills actively working to compromise a specific system
Structured Threats
Originate from individuals who have (or had) authorized access to network
Internal Threat
Threats from individuals outside organization often attacking through Internet
External Threats
What are the network attack categories?
Reconnaissance Attack, Access Attack, Denial-of-service (DoS) Attacks, Data Manipulation Attacks
Unauthorized user attempts to gain as much information about network before launching other more serious types of attacks
Reconnaissance Attack
Individual attempts to gain unauthorized access of computer resources
Access Attacks
Primary purpose is to deny access to system or network by bombarding it with traffic
Denial-of-Service (DoS) Attacks
Often called “man-in-the middle” attacks
Data Manipulation Attacks
Group of computers connected to Internet having been compromised by hacker using computer virus or Trojan
Botnet
What is an individual botnet computer known as?
Zombie
Attacker obtains key used to interpret secured information
Compromised-Key Attack
Software designed to spread from one infected computer to another
Computer Virus
Software designed to replicate itself from one computer to another without human interaction
Computer Worm
Attacker gains access to communication lines using sniffer to read (aka “listen to’’) network traffic
Eavesdropping
Attacker falsely assumes valid IP address for system on network giving appearance they are legitimate user inside corporate intranet
Identity Spoofing (IP Address Spoofing)
Program created to spy on victims, recorded information is sent back to originator via Internet
Malicious Spyware
Term refers to any code used in malicious manner to include being intrusive or annoying
Malware
Eavesdroppers gain access to network when older applications did not encrypt identity information
Password-Based Attacks
Message attempts to lure victim into giving personal information or by clicking lick in email to verify information
Phishing
Asks user to click on provided link to install update or remove malicious software
Rogue Security Software
Collection of hacking tools used to obtain administrator-level access to computer system or network
Rootkit
Unwanted email messages
Spam
Infects computers by user downloading application they thought legitimate but was in fact malicious
Trojan
Any circumstance or event that may compromise system or data it contains
Threat
Attacks begin from inside of organization (Malicious/Non-Malicious)
Internal Threats
Weakest link in any security system
People
May result in extended processing delays and/or inability to have mission critical communications
Equipment & Software Failures