Secuirty Flashcards
What is phishing?
social engineering attack where attacker masquerades as a trusted entity to steal data
Traditional secuirty procedures
Use strong passwords, control access to data and systems, installing reliable antivirus software
What is asynchronous encryption type
RSA. 1024-2048 bits in length. Slower process, incomparable security. Used in email certificates, SSL/TLS certificates
What are some common security threats?
Phissing
Typo Squatting
DNS typo poisening
SQL Injection
Trojan Hourse
DDOS
What is phishing?
social engineering attack where attacker masquerades as a trusted entity to steal data. Typically refers to an email that looks like it came from a trusted source
What is an SQL Injection?
Modify sql requests such as putting an SQL query in a text field.
What is a trojan horse?
software pretending to be something else to gain access
What is a worm?
Malware that replicates itself
How do we mitigate or prevent these threats from happening?
Network segmentation, intrusion detection systems, intrusion prevention systems, reduce insider threat
What is DNS cache poisoning?
Changing the DNS cache so a user is sent to the wrong website.
What is an example of a cyber attack?
Man-in-the-middle - an attacker positions himself in a conversation between a user and an application or user and another user to eavesdrop of impersonating with the goal of stealing data.
What is identity management?
a framework of policies and technologies to ensure that the right users have the appropriate access to technology resources