IT Security Basics Chapter 1

SophisticatedAtlanta avatar
SophisticatedAtlanta
·
·
Download

Start Quiz

Study Flashcards

19 Questions

What is a security threat?

A risk that can potentially harm computer systems, organization, and (web) service providers.

What are the consequences of security threats?

Leak of private information

Malicious code includes viruses, trojan horses, and attack scripts.

True

_______ is defined as the physical removal of an object that is capable of being stolen without the consent of the owner.

Theft

Match the types of security threats with their descriptions:

Malicious code = Code inserted in software system to breach security Hacking = Unauthorized access to computer systems for illicit purposes Natural disaster = Extreme and sudden events causing damage Theft = Physical removal of objects without consent

Which type of attack involves multiple compromised systems targeting a single system to cause a Denial of Service (DoS) attack?

DDoS

Define Sniffing in the context of network security.

Sniffing is the process of monitoring and capturing data packets passing through a network to capture sensitive information.

Vishing is the telephone equivalent of phishing.

True

A ___ is a type of malware that spreads copies of itself from computer to computer.

worm

Match the following malicious code with their descriptions:

Virus = Malicious software loaded onto a user's computer without their knowledge Trojan Horse = Type of malware disguised as legitimate software Worm = Malware that spreads copies of itself from computer to computer

What type of scan tends to be slow because machines tend to slow down their responses to this kind of traffic?

SYN Scan

In a SYN Scan, a TCP connection is established with the target machine.

False

What is the purpose of an ACK Scan?

determine whether a particular port is filtered or not

A NULL Scan sets all the header fields to ___.

null

Match the following methods of hard drive destruction with their descriptions:

Drilling holes through drive platters = Not completely effective as data can still be recovered Shattering the platters with a hammer = Ensures data cannot be recovered Reformatting hard drives = Can be used for drives without sensitive data

What are the three goals of security?

Confidentiality, Integrity, Availability

What is the term used to describe an individual who attempts to gain unauthorized access to network resources with malicious intent?

Cracker

What is the term used to describe an individual who sends large numbers of unsolicited e-mail messages?

Spammer

Match the following types of hackers with their descriptions:

Black Hat = Individuals who break into systems or networks without authorization White Hat = Individuals who find vulnerabilities and report them for fixing Script Kiddies = Unskilled individuals who use existing scripts to hack systems Phreaker = Manipulates phone networks to perform unauthorized functions Cybercriminals = Engage in criminal activities involving computers and networks Spammer = Sends out large volumes of unwanted emails

Study Notes

Security Basics

Introduction to Security

  • Security threats: risks that can potentially harm computer systems, organizations, and web service providers
  • Consequences of security threats: financial damages, leak of information, theft of private data, and disruption of services

Types of Security Threats

  • Malicious Code (Malware)
    • Malicious code: application security threat that cannot be efficiently controlled by conventional antivirus software alone
    • Types of malicious code: attack scripts, viruses, worms, Trojan horses, backdoors, and malicious active content
    • Sources of malware: expert hackers, virus creation software, and criminals
  • Hacking
    • Hacking: an attempt to exploit a computer system or private network inside a computer
    • Main goal of hacking: to gain some sort of benefit or satisfaction, such as profits, destruction of property, or private information
  • Natural Disasters
    • Natural disasters: extreme, sudden events caused by environmental factors that injure people and damage property
    • Examples: floods, hurricanes, tornadoes, volcanic eruptions, earthquakes, and tsunamis
  • Theft
    • Theft: physical removal of an object that is capable of being stolen without the consent of the owner and with the intention of depriving the owner of it permanently

Sources of Security Threats

  • Internal Threats
    • Originate from within the organization
    • Examples: employees, contractors, or suppliers who could exploit a system to cause damage or steal data
  • External Threats
    • Originate from outside the organization
    • Examples: physical threats, socio-economic threats, network security threats, communication threats, and human threats
  • Structured Threats
    • Organized efforts to breach a specific network or organization
    • Examples: targeted attacks on a specific company or individual
  • Unstructured Threats
    • Random and usually the result of an attacker identifying a vulnerability by scanning the network
    • Examples: automated attacks using scripts and tools available on the internet

Methods of Security Attacks

  • Reconnaissance Attack
    • Gathering information about a target before launching an actual attack
    • Examples: port scanning, DNS reconnaissance, and network mapping
  • Access Attack
    • Attempting to access another user's account or network device through improper means
    • Examples: hacking, brute force attacks, and unauthorized access
  • Denial of Service (DoS) Attack
    • Flooding a system or network with traffic to make it unavailable to users
    • Examples: targeted attacks on a website or network
  • Distributed Denial of Service (DDoS) Attack
    • Multiple compromised systems used to target a single system, causing a Denial of Service (DoS) attack
    • Examples: attacks on high-profile websites or organizations
  • Malicious Code Attack
    • Using malicious code to cause undesired effects, security breaches, or damage to a system
    • Examples: viruses, worms, Trojan horses, and backdoors

Social Engineering

  • Social Engineering +Manipulating people to give up confidential information
    • Examples: phishing, pretexting, and vishing
  • Phishing
    • Tricking individuals into giving up confidential information through email or other online means
    • Examples: fraudulent emails, fake websites, and scams
  • Vishing
    • Using the telephone to scam individuals into surrendering private information
    • Examples: fraudulent phone calls, scams, and identity theft### Introduction to Security
  • Information security protects information from a wide range of threats
  • It preserves an organization's value

Goals of Security

Confidentiality

  • Protecting information from unauthorized access, use, disclosure, disruption, modification, or destruction
  • Ensuring that only authorized individuals can access important information
  • Examples: keeping credit card numbers secure during online transactions, only allowing authorized parties to view sensitive information

Integrity

  • Guarding against improper information modification or destruction
  • Ensuring that the information is correct and no unauthorized person or malicious software has altered the data
  • Examples: preventing attackers from changing the amount of a purchase, ensuring data is accurate and reliable

Availability

  • Ensuring timely and reliable access to and use of information
  • Ensuring that data is accessible to authorized users
  • Examples: ensuring that data is not "locked up" so tight that no one can access it, having backups in place to ensure data availability

Attackers and Hackers

  • Attacker: an individual or organization performing malicious activities
  • Hacker: a skilled computer expert, but the term has become associated with a "security hacker" who uses technical knowledge to break into computer systems
  • Types of hackers:
    • Cracker: an individual who attempts to gain unauthorized access to network resources with malicious intent
    • Phreaker: an individual who manipulates the phone network to cause it to perform a function that is normally not allowed
    • Script kiddies: unskilled individuals who use scripts or programs developed by others to attack computer systems and networks
    • Cybercriminals: individuals who commit crimes involving computers and networks
    • Spammer: an individual who sends large numbers of unsolicited e-mail messages
    • White hat: an individual who uses their abilities to find vulnerabilities in systems or networks and reports them to the owners
    • Black hat: an individual who uses their knowledge of computer systems to break into systems or networks that they are not authorized to use

Network Scanning

  • Nmap (Network Mapper): a free, open-source tool for vulnerability scanning and network discovery
  • Types of scans:
    • TCP scan: checks for open ports and services
    • UDP scan: checks for open UDP ports
    • SYN scan: a type of TCP scan that sends a SYN packet to a target to determine if a port is open
    • ACK scan: determines if a port is filtered or not
    • FIN scan: a type of TCP scan that sends a FIN packet to a target to determine if a port is open
    • NULL scan: a type of TCP scan that sends a packet with no flags set to a target to determine if a port is open
    • XMAS scan: a type of TCP scan that sets multiple flags in a packet to a target to determine if a port is open
    • RPC scan: discovers machines that respond to Remote Procedure Call (RPC) services

Netstat

  • A program that displays active Internet connections, routing tables, and interface statistics
  • Can be used to show active connections, routing tables, and interface statistics
  • Available in Windows and Linux operating systems

NetScan

  • A powerful, flexible network monitoring system that extracts information directly from the control and user plane
  • Offers continuous monitoring of 100% of transactions in real-time
  • Captures, processes, consolidates, and stores data for real-time or historic reporting

Data Wiping

  • Deleting files from a hard drive does not remove them completely from the computer
  • Data wiping, also known as secure erase, is a software-based method of overwriting data to prevent recovery
  • Methods of data wiping:
    • ICMP (ping)
    • Script
    • AWS scan

Hard Drive Destruction

  • Destroying a hard drive is the best option for companies with sensitive data
  • Methods of hard drive destruction:
    • Drilling holes through a drive's platters
    • Shattering the platters with a hammer
    • Safely disposing of the pieces

Hard Drive Recycling

  • Hard drives that do not contain sensitive data can be reformatted and used in other computers

  • Types of formatting:

    • Standard format: a high-level format that creates a boot sector and sets up a file system
    • Low-level format: a low-level format that marks the surface of the disk with sector markers to indicate where data will be stored physically on the disk### Confidentiality, Integrity, and Availability
  • The CIA triad consists of three primary components: confidentiality, integrity, and availability.

Hackers vs Attackers

  • A hacker is a skilled computer expert who uses their technical knowledge to overcome a problem.
  • An attacker, on the other hand, is an individual or organization performing malicious activities, such as attempting to destroy, expose, alter, disable, steal, or gain unauthorized access to or make unauthorized use of an asset.

Types of Hackers

  • Black Hat: a malicious hacker who uses their skills for illegal or unethical purposes.
  • White Hat: a security hacker who uses their skills to help organizations protect themselves against threats.
  • Phreaker: a hacker who specializes in telecommunication systems and networks.
  • Cracker: a malicious hacker who uses their skills to break into secure systems.
  • Script Kiddies: inexperienced hackers who use pre-existing scripts and tools to launch attacks.
  • Spammer: a hacker who sends large amounts of spam or unwanted emails.
  • Cybercriminal: a hacker who uses their skills to commit crimes, such as stealing sensitive information or money.

This quiz introduces security basics, including types of security threats, sources of security threats, and more. Test your knowledge of security fundamentals.

Make Your Own Quizzes and Flashcards

Convert your notes into interactive study material.

Get started for free

More Quizzes Like This

Computer Security Quiz
5 questions

Computer Security Quiz

CompatibleFriendship1040 avatar
CompatibleFriendship1040
Untitled
50 questions

Untitled

AgreeableSerpentine4389 avatar
AgreeableSerpentine4389
Criminal IT Threats and Cybersecurity
24 questions

Criminal IT Threats and Cybersecurity

ConciliatoryArchetype6356 avatar
ConciliatoryArchetype6356
Network Threats Classification
40 questions
Use Quizgecko on...
Browser
Browser