Cisco Networking ITN Module 16 Review

Ace your homework & exams now with Quizwiz!

Policy Vulnerabilities

Lack of written security policies, politics, lack of authentication continuity, logical access controls not applied, software and hardware installation and changes do not follow policy, and a nonexistent disaster recovery plan

Technological Vulnerabilities

TCP/IP Protocol, Operating System, or Network Equipment Weaknesses

Denial of Service Attack

The disabling or corruption of networks, systems, or services

Reconnaissance Attack

The discovery and mapping of systems, services, or vulnerabilities

Access Attack

The unauthorized manipulation of data, system access, or user privileges

Configuration Vulnerabilities

Unsecured user accounts, easily guessed passwords, misconfigured settings, unsecured default settings, and misconfigured network equipment

login local

a command used to force the switch to look in the local database for a username and password to authenticate for SSH

ASA Firewall

a dedicated device that provides stateful firewall services ensuring that internal traffic can go out and come back, but external traffic cannot initiate connections to inside hosts

AAA Server

a server that contains a secure database of who is authorized to access and manage network devices

Worm

a type of malware that are standalone programs that do not require a host program or human help to propagate

Virus

a type of malware that propagates by inserting a copy of itself into, and becoming part of, another program

Authenticate, Authorize, and Accounting

a way to control who is permitted to access a network, what actions they perform while accessing the network, and making a record of what was done while they are there

VPN

allows a secure private connection over a public network, using an encrypted 'tunnel'

DDoS Attack

an attack that uses a botnet of compromised computers to disrupt legitimate access to a system

DoS Attack

an attack whose purpose is to disrupt legitimate access to a system

IPS

an intrusion prevention system that monitors incoming and outgoing traffic looking for malware, network attack signatures, and, if it recognizes a threat, it can immediately stop it

Password Attack

any type of attack in which the attacker attempts to obtain and make use of passwords illegitimately

Data loss and Manipulation

breaking into a computer to destroy or alter data records

Information Theft

breaking into a computer to obtain confidential information

service password-encryption

command that encrypts plain text passwords on a router or switch

security passwords min-length

command that enforces the character length of the password on a router or switch

login block-for attempts within

command that prevents brute-force password guessing attacks on a router or switch

exec-timeout

command that sets the timeout in seconds and minutes for the console connection

crypto key generate rsa general-keys modulus

command used to generate an encryption key for SSH on a router or switch

transport input ssh

disables telnet by specifying only SSH in the line configuration command

Port Scans

discovering services on publicly accessible IP addresses that are actively listening that may have vulnerabilities

no ip http server

dispables the built-in web server on a router

show ip ports all

displays open service ports on a router

ESA

email security appliance that filters spam and suspicious emails

Stateful Packet Inspection

firewall feature where incoming packets must be legitimate responses to requests from internal hosts and unsolicited packets are blocked unless permitted specifically

Ping Sweeps

identifying active public IP addresses using fping or gping tools

Hardware Threats

physical damage to servers, routers, switches, cabling plant, and workstations

Maintenance Threats

poor handling of key electrical components (electrostatic discharge), lack of critical spare parts, poor cabling, and poor labeling

Disruption of Service

preventing legitimate users from accessing services to which they are entitled

Packet Filtering

prevents or allows access based on IP or MAC addresses

Application Filtering

prevents or allows access by specific application types based on port numbers

URL Filtering

prevents or allows access to websites based on specific web addresses or keywords

Firewall

protects computers and networks by preventing undesirable traffic from entering internal networks

SSH

protocol used for secure, encrypted remote access to a router, switch, or server

Internet Queries

searching for information on a target using Google search, nslookup, and whois

Password

should be 10 or more characters in length and complex using upper and lowercase letters, numbers, and symbols

Data Backup

stores a copy of the information on a computer to removable backup media that can be kept in a safe place

Environmental Threats

temperature extremes (too hot or too cold) or humidity extremes (too wet or too dry)

Trojan Horse

type of malware named after the wooden horse the Greeks used to infiltrate Troy that is a harmful piece of software that looks legitimate tricking users into loading and executing it on their systems creating back doors to give malicious users access to their system

Port Redirection Attack

using a compromised system as a base for attacks against other targets

Trust Exploitation Attack

using unauthorized privileges to gain access to a system, possibly compromising the target

Electrical Threats

voltage spikes, insufficient supply voltage (brownouts), unconditioned power (noise), and total power loss

WSA

web security appliance that filters known and suspicious internet malware sites

Man-in-the-Middle Attack

when a threat actor is positioned in between two legitimate entities in order to read or modify the data that passes between the two parties

Identity Theft

where personal information is stolen for the purpose of taking over someone's identity


Related study sets

CHAPTER 19 The Cardiovascular System: The Heart

View Set

*HURST REVIEW Qbank/Customize Quiz - Safety and Infection Control

View Set

History of the Holocaust Week 4 Terms

View Set

CIS121 Programming and Logic Chapter 4

View Set