ITNv7 Lesson 16 - Network Security Fundamentals

0.0(0)
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/23

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

24 Terms

1

Information theft

Occurs when someone steals personal or confidential information like trade secrets or financial information.

2

Data loss

Occurs when information on a storage device is damaged or made unusable

3

identity theft

A crime that involves someone pretending to be another person in order to steal money or obtain benefits

4

Disruption of service

Preventing legitimate users from accessing services to which they should be entitled

5

Trojan horse

Malicious code that has been written specifically to look like a legitimate program.

6

virus

Attaches itself to an actual legitimate program and requires manual intervention from a user to spread from one system to another.

7

worm

Able to spread automatically (without user intervention) between systems by exploiting vulnerabilities on those devices.

8

Man-in-the-middle attack

The threat actor gets between devices in the system and intercepts all of the data being transmitted. This information could simply be collected or modified for a specific purpose and delivered to its original destination.

9

Eavesdropping attack

When devices are being installed, the threat actor can intercept data such as security keys that are used by constrained devices to establish communications once they are up and running

10

SQL injection (SQLi)

Threat actors uses a flaw in the Structured Query Language (SQL) application that allows them to have access to modify the data or gain administrative privileges.

11

Routing attack

A threat actor could either place a rogue routing device on the network or modify routing packets to manipulate routers to send all packets to the chosen destination of the threat actor. The threat actor could then drop specific packets, known as selective forwarding, or drop all packets, known as a sinkhole attack.

12

Reconnaissance attack

Involves an adversary attempting to gather information about a network to identify vulnerabilities

13

Stateful packet inspection

Prevents or allows access based on whether the traffic is in response to requests from internal hosts

14

URL filtering

Prevents or allows access based on web addresses or keywords.

15

Application filtering

Prevents or allows access by specific application types based on port numbers

16

Packet filtering

Prevents or allows access based on the IP or MAC addresses of the source and destination.

17

Authentication

Users prove who they are

18

Authorization

Determines which resources the user can access.

19

Accounting

Keeps track of the actions of the user.

20

login block-for 60 attempts 5 within 60

Mitigates brute-force attacks by setting a limit on the maximum number of failed login attempts allowed within a defined period of time.

21

Steps to Configure SSH

Configure device hostname

Configure a domain name

Generate RSA keys

Create a local user and password

Use the transport input ssh command

Use the login local command

22

Why is SSH preferred over Telnet?

SSH is encrypted

23

Intrusion Prevention System (IPS)

detects and blocks attacks in real time

24

Layered Approach

Using different defenses at various points of the network.