Lab Simulation 1-1: Understanding the Various Attack Types
Greater sophistication of attacks
Attack tools vary their behavior so the same attack appears differently each time
Increased speed of attacks
Attackers can launch attacks against millions of computers within minutes
Those who implement and properly use security products to protect data
People
Which of the choices is NOT part of the CIA model
Information
Universally connected devices
Attackers from anywhere in the world can send attacks
User confusion
Users are required to make difficult security decisions with little or no instruction
plans and policies established by an organization to ensure that people correctly use the products
Policies and Procedures
Which of the choices provided would be considered a critical asset
Information
Which of the choices provided ensures that information is correct and has not been altered
Integrity
Why would system software not be considered a critical asset
All of these are correct
Distributed attacks
Attackers use thousands of computers in an attack against a single computer or network.
Which of the choices provided ensures that only approved individuals can access special content?
Confidentiality
Select the critical asset in the choices provided
Customized business software
Availability and simplicity of attack tools
Attacks are no longer limited to highly skilled attackers
Which of the choices provided ensures that information is accessible only to authorized users
Avaliability
Weak security update distribution
Many software products lack a means to distribute security updates in a timely fashion.
Form the security around the data. May be as basic as door locks or as complicated as network security equipment
Products
Delays in security updating
Vendors are overwhelmed trying to keep pace updating their products against the latest attacks.