5.0 Network Security


5.4 Explain common threats, vulnerabilities, and mitigation techniques.

  • Wireless:


    • War driving


    • War chalking


    • WEP cracking


    • WPA cracking


    • Evil twin


    • Rogue access point


  • Attacks:


    • DoS


    • DDoS


    • Man in the middle


    • Social engineering

      Social engineering is a term that describes a non-technical kind of intrusion that relies heavily on human interaction and the process of using or manipulating people to gain access to unauthorized resources.


    • Virus

      Viruses are computer programs, usually short pieces of code, that can be spread to other computers through downloaded material, email attachments, or redirected web pages. Many are capable of reproduction, making the removal of these annoyances often quite difficult, and even more are introduced daily. The presence of a virus may often be indicated by browser redirects, unwanted pop-ups, sluggish performance, or even system crashes.


    • Worms

      A worm is a malicious program, similar to a virus, except for the manner in which it's spread. A worm duplicates itself, unlike a virus which attempts to infect other files.

      The most common type of worm is the email worm. Email worms do not infect other files as do viruses, but spread by sending copies of themselves to any email addresses found on the infected system, and in turn, any of the recipient systems that become infected will also spread copies of the worm to any email addresses on their system. Email worms can spread globally within moments by using this simple tactic.


    • Buffer overflow


    • Packet sniffing


    • FTP bounce


    • Smurf


  • Mitigation techniques:


    • Training and awareness


    • Patch management


    • Policies and procedures


    • Incident response


Recommended

 





Associates