Security + Flashcards
vulnerability
flaw that affects security
flaw that affects security
vulnerability
Threat vector
The path that the threat takes to the target
The path that the threat takes to the target
Threat vector
What are some common paths threat vectors can take?
- email:embedded links, attached files
- web browser: Fake site, session hijack
- wireless hot spot: Rogue access point
- telephone: Social engineering
- USB Flash drive: Auto - executing malware
- physical access: Stolen data and equiptment
Nmap is a utility used for ________ discovery, administration and security auditing.
network
What is the name of a utility used for network discovery, administration and security auditing?
Nmap
In our Nmap lab we will learn and understand how to:
- scan a whole Subnet
- trace all the sent and received packets
- perform a slow comprensive scan
- create a new profile to perform a nul scan
- scan TCP and UDP ports
- Analyze host details and their topology
TCP Connect Scan
Uses a normal TCP connection to determine if a port is available
Xmas Scan
Involves sending TCP segments with the all flags sent in the packet header, generating packets taht are illegal according to RFC 793.
ACK Flag Scan
Involves sending spoofed packets to a target.
Information Security Triad
More secure means harder to use; less functionality
confidentiality
The data is only readable by those authorized
Integrety
The data has not changed
Availability
The data is accessable