Section 3: Introduction to Network Security Flashcards
Define ‘asset’
A person, device, location, or information that SecOps aims to protect from attack
Define ‘attack’
An action taken by a threat that exploits a vulnerability that attempts to either block authorized access to an asset, or to gain unauthorized access to an asset
Define ‘risk’
The potential of a threat to exploit a vulnerability via an attack
Define ‘SecOps’
The abbreviation for IT security operations; a discipline within IT responsible for protecting assets by reducing the risk of an attack.
Define ‘threat’
Something or someone that can exploit a vulnerability to attack an asset
Define ‘vulnerability’
A weakness in software, hardware, facilities, or humans that can be exploited by a threat
What are some common security vulnerabilities?
Zero-day, personal devices on a network, weak or default passwords, poor physical security measures, and advanced persistent threats
Describe the vulnerability ‘advanced persistent threats’
Malware that lays dormant for long enough to infect as many devices as possible.
Describe ‘zero-day’ threats
threats that may have been discovered but patches against them have not been released to the public
What are some examples of attacker types?
Script kiddies, nation states, insider threats, hackers; black, white, and gray hats, teams; blue, red, purple, and white, vulnerability testers
What is an example of an ‘ethical’ hacker?
- blue, red, and purple teams
- White hat
- vulnerability testers
Describe some types of security threats
Wire tapping, buffer overflow, DOS and DDOS (smurfing), Social engineering, spoofing, SQL injections, port scanning
What’s easier than hacking a computer?
hacking a human
Describe the sequence of events in denial-of-service attack
Attacker floods a computer with ICMP’s of packets forged with false addresses, which then forces the victims computer to respond to these pings to made up addresses, crashing the victims computer.
What is the difference between DOS and DDOS?
DDOS marks the victims computer as a sender, and employs multiple computers in a network to flood the victims computer with ICMP packets