Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
17 Cards in this Set
- Front
- Back
War Driving and War Chalking |
-attackers drive around looking for open Access Points -attackers would write markings in chalk to identify open Access Points to other attackers |
|
Cracking WEP ad WPA |
Cracking WEP and WPA |
|
Rouge Access Points |
-unauthorized access points used to gain to the network(Evil twins) -Unauthorized access points or hot spot used to steal info -mimics the real access point |
|
Denial of services and Distributed Service |
-an ICMP(Internet Control Management Protocol)attack on a network to **** the network down -multiple ICMP attacks from multiple users or Bots |
|
Man in the Middle |
-attackers connects b/t two users or devices and steals data or changes data sent to the end user.
|
|
Social Engineering |
-most common attacks -attackers ask questions and users are happy to tell them. |
|
Buffer Overflow |
-an anomaly when a program while writing to the buffer overflows the buffer. Results are the Network shutdown or the attacker gain access to network.
|
|
FTP(File Transfer Protocol) Bounce |
-an attacker is able to use the PORT command to request access to ports indirectly through the use of the victim machine as a middle man of the request. |
|
Mitigate Threats Security Policies(Physical and Information) |
-locks down USB ports -no outside devices and/or software |
|
Patch Management |
-make sure your systems are up to date.
|
|
Computer Incident Response Teams(CIRT) |
-mobile crisis team -computer forensics |
|
End-User Awareness and Training |
-most valuable tool |
|
Firewalls(Packet Filtering) |
-software and hardware firewalls -stateful inspections and packet filtering |
|
Firewall rules |
-uses tuples to allow to disallow traffic -logical top to bottom list |
|
Network Security Appliances IPS and IDS |
-Intrusion Prevention System(IPS)(Active) -Intrusion Detection System(IDS)(Passive) |
|
Vulnerability Scanning |
-scans network for vulnerabilities
|
|
Honey Pot-Single system(Decoy) |
- a controlled environment setup to attract and study attackers methods. |