Network Security Fundamentals
Across
- 3. This type of vulnerability might include TCP/IP Protocol weaknesses, Operating System Weaknesses, and Network Equipment weaknesses.
- 6. A type of access attack that is implemented using brute force, trojan horse, and packet sniffers.
- 8. This physical threat includes physical damage to servers, routers, switches, cabling plant, and workstations
- 12. A type of network attack that is defined by the unauthorized manipulation of data, system access, or user privileges.
- 14. Similar to a virus in that it replicates functional copies of itself, but it is standalone software and does not require a host program or human help to propagate.
- 15. The degree of weakness in a network or a device.
- 17. An infected host.
- 22. Short for "malicious software".
- 23. A network of zombies.
- 25. A harmful piece of software that looks legitimate. They self-replicate and must spread through user interaction such as opening an email attachment or downloading and running a file from the internet.
- 26. Similar to a DoS attack, but it originates from multiple, coordinated sources.
- 27. A type of access attack where a threat actor uses a compromised system as a base for attacks against other targets.
- 28. This type of vulnerability might include lack of a written security policy, politics, lack of authentication continuity, logical access controls not applied, software and hardware installation and changes not following policy, and a nonexistence disaster recovery plan.
- 29. This physical threat includes poor handling of key electrical components (electrostatic discharge), lack of critical spare parts, poor cabling, and poor labeling.
Down
- 1. This physical threat includes voltage spikes, insufficient supply voltage (brownouts), unconditioned power (noise), and total power loss.
- 2. A type of network attack that is defined by the discovery and mapping of systems, services, or vulnerabilities.
- 4. A type of malware that propagates by inserting a copu of itself into, and becoming part of, another program. It spread from one computer to the other.
- 5. Prevents or allows access by specific application types based on port numbers.
- 7. A type of access attack where the threat actor is positioned in between two legitimate entities in order to read or modify the data that passes between the two parties.
- 9. This type of vulnerability might include unsecured user accounts, system accounts, with easily guessed password, misconfigured internet services, unsecure default settings, and misconfigured network equipment.
- 10. Prevents or allows access based on IP or MAC addresses.
- 11. An internet tool used to easily determine the IP address space assigned to a given corportation or entity.
- 13. Has the capability to recognize and filter out specific types of attacks, such as a denial of service (DoS).
- 16. This physical threat includes temperature extremes (too hot or too cold) or humidity extremes (too wet or too dry).
- 18. Also called a host. It is an individual computer system or devices that acts as a network client.
- 19. A type of access attack where a threat actor uses aunauthorized privileges to gain access to a system, possibily compromisng the target.
- 20. A type of network attach that is defined by the disabling or corruption of networks, systems, or services.
- 21. Resides between two or more networks, controls the traffic between them, and helps prevent unauthorized access.
- 24. Prevents or allows access to websites based on specific URLs or keywords.
- 26. Enables a network administrator to apply specific policies for hosts connected to that network.