Chapter 1: Network Security TerminologyIn This Chapter✓ Introduction to security terminology✓ Identifying types of attacks✓ Looking at security device
456Identifying Types of AttacksAlso note that because there are dictionary files for different languages you should not use words found in any diction
Book IVChapter 1Network Security Terminology457Identifying Types of AttacksDenial of serviceAnother popular network attack is a denial of service (DoS
458Identifying Types of Attacks 2. All systems that are pinged reply to the modified source address — an unsuspecting victim. 3. The victim’s system (
Book IVChapter 1Network Security Terminology459Identifying Types of AttacksMan-in-the-middleA man-in-the-middle attack involves the hacker interceptin
460Identifying Types of Attacks To protect against buffer overflow attacks, you need to keep the system, applications, and devices up to date with pat
Book IVChapter 1Network Security Terminology461Looking at Security Devicesautomatically, infecting each computer. How the virus spreads depends on the
462Looking at Security Devicesas the destination port is 80, the packet is then allowed or denied access to the network depending on how the firewall
Book IVChapter 1Network Security Terminology463Looking at Security DevicesThe first firewall (Firewall1 in Figure 1-4) is connected to the Internet an
464Looking at Security DevicesThere are two main types of intrusion detection systems: ✦ Host-based IDS: This is typically software installed on the
Book IVChapter 1Network Security Terminology465Looking at Security Devices ✦ Disable ports: For security reasons, you need to disable any ports on the
Quick Assessment448 Quick Assessment 1 (True/False). A packet-filtering firewall checks the state of the conversation. 2 A ______ is responsible f
466Mitigating Security Threats VPN protocols are responsible for encrypting the data. Examples of VPN protocols are the Point-to-Point Tunneling Prot
Book IVChapter 1Network Security Terminology467Mitigating Security Threats ✦ Patch systems. Be sure to keep your servers up-to-date with patches. This
468Chapter SummaryChapter SummaryThis chapter covers the fundamental concepts regarding network security. It is an important topic, but understand tha
Book IVChapter 1Network Security Terminology469Lab ExercisesTerm Description___ Vulnerability A. Verifying a user’s identity.___ Packet-filtering fire
Prep Test 1 What type of firewall can allow or deny traffic after inspecting the application data in the packet?A ❍ Application-level firewallB ❍ St
6 What type of attack involves the hacker sending too much data to the applica-tion, which normally results in administrative access within a command
Answers 1 A. Application-level firewalls can inspect the application-level data, such as what application command is executing, and either allow or de
Answers449 Answers 1 False. See “Firewalls.” 2 VPN. Review “Virtual Private Networks.” 3 Authorization. Check out “Authorization.” 4 False. Pe
Introduction to Security Terminology450Introduction to Security TerminologyLet me start the discussion by going over some basic security concepts and
Book IVChapter 1Network Security Terminology451Introduction to Security TerminologyStrong passwordsIt is really hard to talk about authentication with
452Introduction to Security TerminologyHackers find out about vulnerabilities in the software and hardware devices we use by purposely testing the lim
Book IVChapter 1Network Security Terminology453Identifying Types of Attacksof the data, and there are a number of ways to ensure availability. For exa
454Identifying Types of AttacksSocial engineering attacksA social engineering attack occurs when a hacker tries to obtain information or gain access t
Book IVChapter 1Network Security Terminology455Identifying Types of Attacks When you are working as a network professional, educate your users never
Comments to this Manuals