Podcast Beta
Questions and Answers
What are the four types of threats that may arise after a threat actor gains access to the network?
Information Theft, Data Loss and Manipulation, Identity Theft, Disruption of Service
What is a vulnerability in the context of network security?
Environmental threats do not affect physical network security.
False
Which of the following are types of malware?
Signup and view all the answers
A good plan for ______ security must be created and implemented to address various threats.
Signup and view all the answers
What are three primary vulnerabilities in network devices?
Signup and view all the answers
Study Notes
Security Threats and Vulnerabilities
- Network attacks can be devastating, resulting in loss of time and money due to damage or theft of information.
- Intruders can gain access through software vulnerabilities, hardware attacks, or by guessing usernames and passwords.
- Threat actors are intruders who exploit software vulnerabilities or modify software to gain network access.
- Four types of threats arise after a threat actor gains access:
- Information theft
- Data loss and manipulation
- Identity theft
- Service disruption
- Vulnerability is a weakness in a network or device.
- Endpoints such as servers and desktops are typically targeted.
- Three primary vulnerabilities are:
- Technological vulnerabilities: TCP/IP protocol weaknesses, operating system weaknesses, network equipment weaknesses.
- Configuration vulnerabilities: Unsecured user accounts, misconfigured internet services, weak passwords, unsecure default settings, misconfigured network equipment.
- Security policy vulnerabilities: Lack of a written security policy, lack of authentication continuity, logical access controls not applied, software and hardware installation and changes not following policy, no disaster recovery plan.
Physical Security
- Network resources can be physically compromised, denying access to network resources.
- Four classes of physical threats are:
- Hardware threats: Physical damage to servers, routers, switches, cabling plant, and workstations.
- Environmental threats: Temperature and humidity extremes.
- Electrical threats: Voltage spikes, brownouts, unconditioned power, and total power loss.
- Maintenance threats: Poor handling of electrical components, lack of critical spare parts, poor cabling, and poor labeling.
Network Attacks
- Malware is malicious software designed to damage, disrupt, steal, or inflict illegitimate actions on data, hosts, or networks.
- Types of malware include:
- Viruses: Self-replicating code that inserts copies into other programs.
- Worms: Self-replicating malware that spreads through networks.
- Trojans: Malicious programs disguised as legitimate software.
- Spyware: Software that collects and transmits personal information.
- Adware: Software that displays unwanted advertisements.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Related Documents
Description
This quiz explores various security threats and vulnerabilities that can impact networks and devices. It covers types of threat actors, weaknesses in systems, and the consequences of breaches, including information theft and service disruptions. Test your knowledge on how to identify and mitigate these risks.