1/15
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Vulnerability
A weak spot in a network that could be exploited by a threat, such as an attacker, potentially leading to data loss, theft, corruption, or downtime. Identifying and fixing vulnerabilities is crucial for network security.
Vulnerability Scanning
A process that checks a network for weaknesses, such as unpatched software or open ports, using tools like Microsoft Baseline Security Analyzer or Nmap. These tools reveal vulnerabilities that might exist in the network.
Security Assessment Tools
Software used to analyze a network environment, detect vulnerabilities, and provide results for network administrators to make informed security decisions. Examples include protocol analyzers, vulnerability scanners, honeypots, and port scanners.
Protocol Analyzer (Ethernet Sniffer)
A tool that monitors network traffic, capturing, filtering, and displaying interactions and interconnections. It provides a window into network traffic but can also be used to eavesdrop on communications if not properly secured.
Honeypot
A decoy system loaded with fake files, designed to trick attackers into believing they are attacking an actual system. This allows network administrators to determine the tools and methods used by attackers.
Honeynet
A network of multiple honeypots, used to gather information about attackers and their methods. Fake files are used to mimic real files, and sensitive files are excluded.
Port Scanner
A tool that detects open or in-use ports on a system, revealing potential entry points for attackers. It sends client requests to port addresses on the server to determine open ports.
Banner Grabbing
A technique used to gather information about a system by sending malformed packets and analyzing error messages. This can reveal details about the operating system, applications, and potential vulnerabilities.
Risk Assessment
A process that identifies potential risks to a network, such as vulnerabilities in applications, operating systems, facilities, or staff. Controls are put in place to mitigate these risks.
Vulnerability Assessment
A process designed to reveal vulnerabilities in a network environment, identifying weaknesses such as missing patches, misconfigured controls, or inadequate password security.
Threat Assessment
A process that identifies potential threats to a network and puts controls in place to address them. This helps prevent attacks and minimize damage.
Penetration Testing
An active test performed by outside experts to
simulate an attack on a network, identifying vulnerabilities and weaknesses in security controls. It differs from vulnerability scanning, which is a passive test.
Black Box Testing
A type of penetration testing where the testers have no knowledge of the test environment, simulating a real-world attack scenario. They must discover vulnerabilities and weaknesses without prior knowledge.
White Box Testing
A type of penetration testing where the testers have full knowledge of the test environment, including operating systems, ports, and properties. This allows for a more focused test.
Grey Box Testing
A type of penetration testing that falls between black box and white box testing, where the testers have some knowledge of the test environment but not all of it. This simulates a scenario where an attacker has some insider knowledge.
Still learning (15)
You've started learning these terms. Keep it up!