Lesson 11. Strengthening Network Defenses: Unveiling Vulnerabilities and Countermeasures

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/15

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

16 Terms

1
New cards

Vulnerability

A weak spot in a network that could be exploited by a threat, such as an attacker, potentially leading to data loss, theft, corruption, or downtime. Identifying and fixing vulnerabilities is crucial for network security.

2
New cards

Vulnerability Scanning

A process that checks a network for weaknesses, such as unpatched software or open ports, using tools like Microsoft Baseline Security Analyzer or Nmap. These tools reveal vulnerabilities that might exist in the network.

3
New cards

Security Assessment Tools

Software used to analyze a network environment, detect vulnerabilities, and provide results for network administrators to make informed security decisions. Examples include protocol analyzers, vulnerability scanners, honeypots, and port scanners.

4
New cards

Protocol Analyzer (Ethernet Sniffer)

A tool that monitors network traffic, capturing, filtering, and displaying interactions and interconnections. It provides a window into network traffic but can also be used to eavesdrop on communications if not properly secured.

5
New cards

Honeypot

A decoy system loaded with fake files, designed to trick attackers into believing they are attacking an actual system. This allows network administrators to determine the tools and methods used by attackers.

6
New cards

Honeynet

A network of multiple honeypots, used to gather information about attackers and their methods. Fake files are used to mimic real files, and sensitive files are excluded.

7
New cards

Port Scanner

A tool that detects open or in-use ports on a system, revealing potential entry points for attackers. It sends client requests to port addresses on the server to determine open ports.

8
New cards

Banner Grabbing

A technique used to gather information about a system by sending malformed packets and analyzing error messages. This can reveal details about the operating system, applications, and potential vulnerabilities.

9
New cards

Risk Assessment

A process that identifies potential risks to a network, such as vulnerabilities in applications, operating systems, facilities, or staff. Controls are put in place to mitigate these risks.

10
New cards

Vulnerability Assessment

A process designed to reveal vulnerabilities in a network environment, identifying weaknesses such as missing patches, misconfigured controls, or inadequate password security.

11
New cards

Threat Assessment

A process that identifies potential threats to a network and puts controls in place to address them. This helps prevent attacks and minimize damage.

12
New cards

Penetration Testing

An active test performed by outside experts to

simulate an attack on a network, identifying vulnerabilities and weaknesses in security controls. It differs from vulnerability scanning, which is a passive test.

13
New cards

Black Box Testing

A type of penetration testing where the testers have no knowledge of the test environment, simulating a real-world attack scenario. They must discover vulnerabilities and weaknesses without prior knowledge.

14
New cards

White Box Testing

A type of penetration testing where the testers have full knowledge of the test environment, including operating systems, ports, and properties. This allows for a more focused test.

15
New cards

Grey Box Testing

A type of penetration testing that falls between black box and white box testing, where the testers have some knowledge of the test environment but not all of it. This simulates a scenario where an attacker has some insider knowledge.

16
New cards

Still learning (15)

You've started learning these terms. Keep it up!