Please enable JavaScript.
Coggle requires JavaScript to display documents.
Chapter 2 : Introduction Vulnerabilities , Threat , and Attack (c. Attacks…
Chapter 2 : Introduction Vulnerabilities , Threat , and Attack
Network Security Terms
a. Vulnerabilities
A weaknesses that is inherent in every network and device . This includes routers , switches , desktops . services , and even security devices themselves
-
-
-
b. Threats
The people eager , willing , and qualified to take advantage of each security weaknesses , and they continually search for new exploits and weaknessess
-
-
-
Internal Threats
when someone has authorized access to the network with either an account on a server or physical access to the network
c. Attacks
Reconnaissance
The unauthorized discovery and mapping systems, services, or vulnerabilities
Access
Ability for an unauthorized intruder to gain access to a device for which the intruder does not have an account or a password
Denial of service (DoS)
An attacker disables or corrupts networks , systems , or services with the with the intent to deny services to intended users
Malicious Code
-
Worm
An application that executes arbitrary code and installs copies of itself in the memory of the infected computer
Virus
Malicious software that is attached to another program to execute a particular unwanted function on the user workstation
Policy Identification
-
Organizations that need a high level of security assurance will require defense-in-depth mechanisms to be deployed to avoid single points of failure
-
Passsword Policy
Weak Password
-
Contains your user name,real name ,or company name
-