Security Threats and Vulnerabilities
6 Questions
0 Views

Security Threats and Vulnerabilities

Created by
@RockStarNaïveArt

Podcast Beta

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What are the four types of threats that may arise after a threat actor gains access to the network?

Information Theft, Data Loss and Manipulation, Identity Theft, Disruption of Service

What is a vulnerability in the context of network security?

  • A measure of network performance
  • A type of network attack
  • The degree of strength in a network device
  • The degree of weakness in a network or a device (correct)
  • Environmental threats do not affect physical network security.

    False

    Which of the following are types of malware?

    <p>Trojan</p> Signup and view all the answers

    A good plan for ______ security must be created and implemented to address various threats.

    <p>physical</p> Signup and view all the answers

    What are three primary vulnerabilities in network devices?

    <p>Technological Vulnerabilities, Configuration Vulnerabilities, Security Policy Vulnerabilities</p> Signup and view all the answers

    Study Notes

    Security Threats and Vulnerabilities

    • Network attacks can be devastating, resulting in loss of time and money due to damage or theft of information.
    • Intruders can gain access through software vulnerabilities, hardware attacks, or by guessing usernames and passwords.
    • Threat actors are intruders who exploit software vulnerabilities or modify software to gain network access.
    • Four types of threats arise after a threat actor gains access:
      • Information theft
      • Data loss and manipulation
      • Identity theft
      • Service disruption
    • Vulnerability is a weakness in a network or device.
    • Endpoints such as servers and desktops are typically targeted.
    • Three primary vulnerabilities are:
      • Technological vulnerabilities: TCP/IP protocol weaknesses, operating system weaknesses, network equipment weaknesses.
      • Configuration vulnerabilities: Unsecured user accounts, misconfigured internet services, weak passwords, unsecure default settings, misconfigured network equipment.
      • Security policy vulnerabilities: Lack of a written security policy, lack of authentication continuity, logical access controls not applied, software and hardware installation and changes not following policy, no disaster recovery plan.

    Physical Security

    • Network resources can be physically compromised, denying access to network resources.
    • Four classes of physical threats are:
      • Hardware threats: Physical damage to servers, routers, switches, cabling plant, and workstations.
      • Environmental threats: Temperature and humidity extremes.
      • Electrical threats: Voltage spikes, brownouts, unconditioned power, and total power loss.
      • Maintenance threats: Poor handling of electrical components, lack of critical spare parts, poor cabling, and poor labeling.

    Network Attacks

    • Malware is malicious software designed to damage, disrupt, steal, or inflict illegitimate actions on data, hosts, or networks.
    • Types of malware include:
      • Viruses: Self-replicating code that inserts copies into other programs.
      • Worms: Self-replicating malware that spreads through networks.
      • Trojans: Malicious programs disguised as legitimate software.
      • Spyware: Software that collects and transmits personal information.
      • Adware: Software that displays unwanted advertisements.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Related Documents

    Description

    This quiz explores various security threats and vulnerabilities that can impact networks and devices. It covers types of threat actors, weaknesses in systems, and the consequences of breaches, including information theft and service disruptions. Test your knowledge on how to identify and mitigate these risks.

    More Like This

    Use Quizgecko on...
    Browser
    Browser