Security + Flashcards
vulnerability
flaw that affects security
flaw that affects security
vulnerability
Threat vector
The path that the threat takes to the target
The path that the threat takes to the target
Threat vector
What are some common paths threat vectors can take?
- email:embedded links, attached files
- web browser: Fake site, session hijack
- wireless hot spot: Rogue access point
- telephone: Social engineering
- USB Flash drive: Auto - executing malware
- physical access: Stolen data and equiptment
Nmap is a utility used for ________ discovery, administration and security auditing.
network
What is the name of a utility used for network discovery, administration and security auditing?
Nmap
In our Nmap lab we will learn and understand how to:
- scan a whole Subnet
- trace all the sent and received packets
- perform a slow comprensive scan
- create a new profile to perform a nul scan
- scan TCP and UDP ports
- Analyze host details and their topology
TCP Connect Scan
Uses a normal TCP connection to determine if a port is available
Xmas Scan
Involves sending TCP segments with the all flags sent in the packet header, generating packets taht are illegal according to RFC 793.
ACK Flag Scan
Involves sending spoofed packets to a target.
Information Security Triad
More secure means harder to use; less functionality
confidentiality
The data is only readable by those authorized
Integrety
The data has not changed
Availability
The data is accessable
Authenticity
The data source is valid
Non repudiation
The data source can not deny it’s creation
What are the five pillars of Information Security?
Confidentiality Integrity Availability Authenticity Non - Repudiation
- email:embedded links, attached files
- web browser: Fake site, session hijack
- wireless hot spot: Rogue access point
- telephone: Social engineering
- USB Flash drive: Auto - executing malware
- physical access: Stolen data and equipment
Common paths threat vectors can take
Nmap can be used for:
- scan a whole _________
- ______ all the sent and received packets
- perform a slow comprehensive scan
- create a new profile to perform a nul scan
- scan TCP and UDP ports
- Analyze host details and their topology
Subnet
trace
Nmap can be used for:
- scan a whole Subnet
- trace all the sent and received ______
- perform a slow comprehensive _______
- create a ____ ______ to perform a nul scan
- scan __________________ ports
- Analyze host details and their ___________
packets scan new profile TCP and UDP topology
“A” record (AAAA) A stands for address and this is how we ultimately define a name with an IP address. A IPV4 AAAA IPV6
One of the most common records on the DNS server