IT Security Basics Chapter 1
19 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is a security threat?

A risk that can potentially harm computer systems, organization, and (web) service providers.

What are the consequences of security threats?

  • Leak of private information (correct)
  • Disruption of services
  • Theft breach (correct)
  • Financial damages (correct)
  • Malicious code includes viruses, trojan horses, and attack scripts.

    True

    _______ is defined as the physical removal of an object that is capable of being stolen without the consent of the owner.

    <p>Theft</p> Signup and view all the answers

    Match the types of security threats with their descriptions:

    <p>Malicious code = Code inserted in software system to breach security Hacking = Unauthorized access to computer systems for illicit purposes Natural disaster = Extreme and sudden events causing damage Theft = Physical removal of objects without consent</p> Signup and view all the answers

    Which type of attack involves multiple compromised systems targeting a single system to cause a Denial of Service (DoS) attack?

    <p>DDoS</p> Signup and view all the answers

    Define Sniffing in the context of network security.

    <p>Sniffing is the process of monitoring and capturing data packets passing through a network to capture sensitive information.</p> Signup and view all the answers

    Vishing is the telephone equivalent of phishing.

    <p>True</p> Signup and view all the answers

    A ___ is a type of malware that spreads copies of itself from computer to computer.

    <p>worm</p> Signup and view all the answers

    Match the following malicious code with their descriptions:

    <p>Virus = Malicious software loaded onto a user's computer without their knowledge Trojan Horse = Type of malware disguised as legitimate software Worm = Malware that spreads copies of itself from computer to computer</p> Signup and view all the answers

    What type of scan tends to be slow because machines tend to slow down their responses to this kind of traffic?

    <p>SYN Scan</p> Signup and view all the answers

    In a SYN Scan, a TCP connection is established with the target machine.

    <p>False</p> Signup and view all the answers

    What is the purpose of an ACK Scan?

    <p>determine whether a particular port is filtered or not</p> Signup and view all the answers

    A NULL Scan sets all the header fields to ___.

    <p>null</p> Signup and view all the answers

    Match the following methods of hard drive destruction with their descriptions:

    <p>Drilling holes through drive platters = Not completely effective as data can still be recovered Shattering the platters with a hammer = Ensures data cannot be recovered Reformatting hard drives = Can be used for drives without sensitive data</p> Signup and view all the answers

    What are the three goals of security?

    <p>Confidentiality, Integrity, Availability</p> Signup and view all the answers

    What is the term used to describe an individual who attempts to gain unauthorized access to network resources with malicious intent?

    <p>Cracker</p> Signup and view all the answers

    What is the term used to describe an individual who sends large numbers of unsolicited e-mail messages?

    <p>Spammer</p> Signup and view all the answers

    Match the following types of hackers with their descriptions:

    <p>Black Hat = Individuals who break into systems or networks without authorization White Hat = Individuals who find vulnerabilities and report them for fixing Script Kiddies = Unskilled individuals who use existing scripts to hack systems Phreaker = Manipulates phone networks to perform unauthorized functions Cybercriminals = Engage in criminal activities involving computers and networks Spammer = Sends out large volumes of unwanted emails</p> Signup and view all the answers

    Study Notes

    Security Basics

    Introduction to Security

    • Security threats: risks that can potentially harm computer systems, organizations, and web service providers
    • Consequences of security threats: financial damages, leak of information, theft of private data, and disruption of services

    Types of Security Threats

    • Malicious Code (Malware)
      • Malicious code: application security threat that cannot be efficiently controlled by conventional antivirus software alone
      • Types of malicious code: attack scripts, viruses, worms, Trojan horses, backdoors, and malicious active content
      • Sources of malware: expert hackers, virus creation software, and criminals
    • Hacking
      • Hacking: an attempt to exploit a computer system or private network inside a computer
      • Main goal of hacking: to gain some sort of benefit or satisfaction, such as profits, destruction of property, or private information
    • Natural Disasters
      • Natural disasters: extreme, sudden events caused by environmental factors that injure people and damage property
      • Examples: floods, hurricanes, tornadoes, volcanic eruptions, earthquakes, and tsunamis
    • Theft
      • Theft: physical removal of an object that is capable of being stolen without the consent of the owner and with the intention of depriving the owner of it permanently

    Sources of Security Threats

    • Internal Threats
      • Originate from within the organization
      • Examples: employees, contractors, or suppliers who could exploit a system to cause damage or steal data
    • External Threats
      • Originate from outside the organization
      • Examples: physical threats, socio-economic threats, network security threats, communication threats, and human threats
    • Structured Threats
      • Organized efforts to breach a specific network or organization
      • Examples: targeted attacks on a specific company or individual
    • Unstructured Threats
      • Random and usually the result of an attacker identifying a vulnerability by scanning the network
      • Examples: automated attacks using scripts and tools available on the internet

    Methods of Security Attacks

    • Reconnaissance Attack
      • Gathering information about a target before launching an actual attack
      • Examples: port scanning, DNS reconnaissance, and network mapping
    • Access Attack
      • Attempting to access another user's account or network device through improper means
      • Examples: hacking, brute force attacks, and unauthorized access
    • Denial of Service (DoS) Attack
      • Flooding a system or network with traffic to make it unavailable to users
      • Examples: targeted attacks on a website or network
    • Distributed Denial of Service (DDoS) Attack
      • Multiple compromised systems used to target a single system, causing a Denial of Service (DoS) attack
      • Examples: attacks on high-profile websites or organizations
    • Malicious Code Attack
      • Using malicious code to cause undesired effects, security breaches, or damage to a system
      • Examples: viruses, worms, Trojan horses, and backdoors

    Social Engineering

    • Social Engineering +Manipulating people to give up confidential information
      • Examples: phishing, pretexting, and vishing
    • Phishing
      • Tricking individuals into giving up confidential information through email or other online means
      • Examples: fraudulent emails, fake websites, and scams
    • Vishing
      • Using the telephone to scam individuals into surrendering private information
      • Examples: fraudulent phone calls, scams, and identity theft### Introduction to Security
    • Information security protects information from a wide range of threats
    • It preserves an organization's value

    Goals of Security

    Confidentiality

    • Protecting information from unauthorized access, use, disclosure, disruption, modification, or destruction
    • Ensuring that only authorized individuals can access important information
    • Examples: keeping credit card numbers secure during online transactions, only allowing authorized parties to view sensitive information

    Integrity

    • Guarding against improper information modification or destruction
    • Ensuring that the information is correct and no unauthorized person or malicious software has altered the data
    • Examples: preventing attackers from changing the amount of a purchase, ensuring data is accurate and reliable

    Availability

    • Ensuring timely and reliable access to and use of information
    • Ensuring that data is accessible to authorized users
    • Examples: ensuring that data is not "locked up" so tight that no one can access it, having backups in place to ensure data availability

    Attackers and Hackers

    • Attacker: an individual or organization performing malicious activities
    • Hacker: a skilled computer expert, but the term has become associated with a "security hacker" who uses technical knowledge to break into computer systems
    • Types of hackers:
      • Cracker: an individual who attempts to gain unauthorized access to network resources with malicious intent
      • Phreaker: an individual who manipulates the phone network to cause it to perform a function that is normally not allowed
      • Script kiddies: unskilled individuals who use scripts or programs developed by others to attack computer systems and networks
      • Cybercriminals: individuals who commit crimes involving computers and networks
      • Spammer: an individual who sends large numbers of unsolicited e-mail messages
      • White hat: an individual who uses their abilities to find vulnerabilities in systems or networks and reports them to the owners
      • Black hat: an individual who uses their knowledge of computer systems to break into systems or networks that they are not authorized to use

    Network Scanning

    • Nmap (Network Mapper): a free, open-source tool for vulnerability scanning and network discovery
    • Types of scans:
      • TCP scan: checks for open ports and services
      • UDP scan: checks for open UDP ports
      • SYN scan: a type of TCP scan that sends a SYN packet to a target to determine if a port is open
      • ACK scan: determines if a port is filtered or not
      • FIN scan: a type of TCP scan that sends a FIN packet to a target to determine if a port is open
      • NULL scan: a type of TCP scan that sends a packet with no flags set to a target to determine if a port is open
      • XMAS scan: a type of TCP scan that sets multiple flags in a packet to a target to determine if a port is open
      • RPC scan: discovers machines that respond to Remote Procedure Call (RPC) services

    Netstat

    • A program that displays active Internet connections, routing tables, and interface statistics
    • Can be used to show active connections, routing tables, and interface statistics
    • Available in Windows and Linux operating systems

    NetScan

    • A powerful, flexible network monitoring system that extracts information directly from the control and user plane
    • Offers continuous monitoring of 100% of transactions in real-time
    • Captures, processes, consolidates, and stores data for real-time or historic reporting

    Data Wiping

    • Deleting files from a hard drive does not remove them completely from the computer
    • Data wiping, also known as secure erase, is a software-based method of overwriting data to prevent recovery
    • Methods of data wiping:
      • ICMP (ping)
      • Script
      • AWS scan

    Hard Drive Destruction

    • Destroying a hard drive is the best option for companies with sensitive data
    • Methods of hard drive destruction:
      • Drilling holes through a drive's platters
      • Shattering the platters with a hammer
      • Safely disposing of the pieces

    Hard Drive Recycling

    • Hard drives that do not contain sensitive data can be reformatted and used in other computers

    • Types of formatting:

      • Standard format: a high-level format that creates a boot sector and sets up a file system
      • Low-level format: a low-level format that marks the surface of the disk with sector markers to indicate where data will be stored physically on the disk### Confidentiality, Integrity, and Availability
    • The CIA triad consists of three primary components: confidentiality, integrity, and availability.

    Hackers vs Attackers

    • A hacker is a skilled computer expert who uses their technical knowledge to overcome a problem.
    • An attacker, on the other hand, is an individual or organization performing malicious activities, such as attempting to destroy, expose, alter, disable, steal, or gain unauthorized access to or make unauthorized use of an asset.

    Types of Hackers

    • Black Hat: a malicious hacker who uses their skills for illegal or unethical purposes.
    • White Hat: a security hacker who uses their skills to help organizations protect themselves against threats.
    • Phreaker: a hacker who specializes in telecommunication systems and networks.
    • Cracker: a malicious hacker who uses their skills to break into secure systems.
    • Script Kiddies: inexperienced hackers who use pre-existing scripts and tools to launch attacks.
    • Spammer: a hacker who sends large amounts of spam or unwanted emails.
    • Cybercriminal: a hacker who uses their skills to commit crimes, such as stealing sensitive information or money.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Description

    This quiz introduces security basics, including types of security threats, sources of security threats, and more. Test your knowledge of security fundamentals.

    More Like This

    Criminal IT Threats and Cybersecurity
    24 questions

    Criminal IT Threats and Cybersecurity

    ConciliatoryArchetype6356 avatar
    ConciliatoryArchetype6356
    IT Security Threats and Vulnerabilities
    16 questions
    Computer Security Threats
    40 questions

    Computer Security Threats

    RelaxedProsperity avatar
    RelaxedProsperity
    Use Quizgecko on...
    Browser
    Browser