T/F: Most network attacks originate from inside the network.
True; approximately 60-80% of misuse incidents originate from the inside network.
Why can internal threats be severe threats?
What are the 3 goals of network security?
What is the Government and Military data classification model?
What is the organizational data classification model?
What are the 3 classification roles?
What are the 3 types of security controls?
What is the chain of custody?
A chain of custody documents who has been in possession of the data/evidence since a security breach occurred.
What is a script kiddy?
Someone who lacks sophisticated hacking knowledge, but downloads hacking utilities to launch attacks.
What is IP Spoofing?
A type of attack where the hacker’s IP address appears to be a trusted IP address.
How do you protect against an IP spoofing attack?