Intro Quiz
What are golden rules for information security
Authentication, access control, and keeping records of activities
What is the ethics of responsible disclosure based on?
Educating both the software owner as well as the public
What does CIA stands for in the computer security context?
Confidentiality, Integrity, and Availability
TCP SYN Scanning is also known as
Half Open
When performing a network mapping for a company, what one seeks to discover?
IP addresses of gateways, routers, servers, and databases as well as network topology as well as their geo-locations
Removal and/or alteration of data, installing "backdoors", and hiding the tracks of attack activities is known as
Operational attacks
Here is how you can use the kill chain model for better security
Put counter measures in place to stop the progression of the kill chain
Discover network interconnection and configuration, and look for network vulnerabilities:
Reconnaissance
What are steps in the kill chain model
Reconnaissance, Network scanning, Weaponize, Delivery, Exploit, Installation, Command and Control, action on Objective
The port scanning technique is used to discover what ports?
TCP
The three way TCP handshake is established using which of the TCP scanning sessions?
TCP SYN
According the responsible disclosure
The owner of the system must acknowledge the security research who found the vulnerability when the vulnerability is fixed