Security Threat Landscape Flashcards
Has the potential to cause harm to an IT Asset…
Threat
A weakness that compromises the security or functionality of a system…
Vulnerability
Uses a weakness to compromise the security or functionality of a system…
Exploit
The likelihood of a successful attack…
Risk
Techniques to eliminate or reduce the potential of and seriousness of an attack…
Mitigation
Malicious software including viruses, trojan horses, worms and ransomware…
Malware
Obtains information about the intended victim in an unassuming, unobtrusive way such a searching WHOIS, phone directories, etc…
Reconnaissance
The use of user deception to manipulate individuals into divulging confidential or personal information…
Social Engineering
A Social Engineering attack where the attacker pretends to be from a reputable company to get individuals to reveal person information, such as passwords and credit card numbers….
Phishing
An attack where data leaves an organization without authorization…
Data Exfiltration
This type of attack prevents legitimate users from accessing an IT resource typically in brute force fashion…
DoS (Denial of Service)
A specific type of DoS attack when an attacker only sends Syn and receives SynAcks but never sends back an Ack…
TCP Syn Flood Attack
A DoS but from multiple sources…
DDoS (Distributed Denial of Service)
This is an army of infected zombie hosts…
Botnet
This attack is where an attacker fakes their identity …
Spoofing
A type of DoS attack where the attacker spoofs the victim’s source address…
Reflection and Amplification Attack
With this attack, the attacker inserts themselves into the communication path between legitimate hosts…
Man in the Middle
An attack where the attacker has connectivity to a login window, they can attempt to gain access to the system behind it…
Password Attack
An Attacker sends malformed and/or too much data to the target system…
Buffer Overflow Attack
An attack where an attacker has compromised a target system or inserted themselves into the network path, Packet Sniffers such a WireShark can be used to read the sent and received packets…
Packet Sniffer
IDS and IPS’ use what to inspect packets?
Signatures
What layer can IDS and IPS’ inspect packets up to?
Layer 7
In regards to the traffic flow, IDS does what?
Sits alongside the traffic flow
In regards to the traffic flow, an IPS does what?
Sits inline with the traffic flow
What is one of the chief differences between an IPS and an IDS?
- An IPS blocks attacks and notifies admins about those attacks
- An IDS inspects the traffic and notifies the administrator about potential concerns
What do firewalls block or permit traffic based on?
Rules not signatures
Do modern firewalls have IPS capability?
Yes
What is the benefit of clustered devices when it comes to Firewalls, IPS or IDS systems?
Clustering allows more throughput, traffic to be load balanced, added redundancy, etc.
What is a network segment that is isolated from both the internal, trusted network and the external, untrusted network, typically by one or more firewalls. It is used to host servers or services that need to be accessible from the internet while keeping the internal network secure
DMZ Demilitarized Zone
Firewalls secure traffic passing through them by either ___________ or _________ it
Permitting or Denying
These types of firewalls maintain a connection table which tracks the two-way state of traffic passing through a firewall
Stateful Firewalls
What type of traffic is permitted by default on Stateful Firewalls?
Return traffic
How does Stateful firewalls keep track of traffic and whether it’s permitted or denied?
The Firewall Connection Table
What Layer do old school Firewalls inspect traffic up to?
Layer 4 Port and Protocol
What Layer do Next Gen Firewalls inspect traffic up to?
Layer 7. All the way up to the application layer.
What is another name for an Access Control List
A Packet Filter