• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/17

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

17 Cards in this Set

  • Front
  • Back

War Driving and War Chalking

-attackers drive around looking for open Access Points


-attackers would write markings in chalk to identify open Access Points to other attackers

Cracking WEP ad WPA

Cracking WEP and WPA

Rouge Access Points

-unauthorized access points used to gain to the network(Evil twins)


-Unauthorized access points or hot spot used to steal info


-mimics the real access point

Denial of services and Distributed Service

-an ICMP(Internet Control Management Protocol)attack on a network to **** the network down


-multiple ICMP attacks from multiple users or Bots

Man in the Middle

-attackers connects b/t two users or devices and steals data or changes data sent to the end user.


Social Engineering

-most common attacks


-attackers ask questions and users are happy to tell them.

Buffer Overflow

-an anomaly when a program while writing to the buffer overflows the buffer. Results are the Network shutdown or the attacker gain access to network.


FTP(File Transfer Protocol) Bounce

-an attacker is able to use the PORT command to request access to ports indirectly through the use of the victim machine as a middle man of the request.

Mitigate Threats


Security Policies(Physical and Information)

-locks down USB ports


-no outside devices and/or software

Patch Management

-make sure your systems are up to date.


Computer Incident Response Teams(CIRT)

-mobile crisis team


-computer forensics

End-User Awareness and Training

-most valuable tool

Firewalls(Packet Filtering)

-software and hardware firewalls


-stateful inspections and packet filtering

Firewall rules

-uses tuples to allow to disallow traffic


-logical top to bottom list

Network Security Appliances


IPS and IDS

-Intrusion Prevention System(IPS)(Active)


-Intrusion Detection System(IDS)(Passive)

Vulnerability Scanning

-scans network for vulnerabilities


Honey Pot-Single system(Decoy)

- a controlled environment setup to attract and study attackers methods.