_____ on a network can be devastating and can result in a loss of time and money due to damage, or theft of important information or assets.
Attacks
_____ can gain access to a network through software vulnerabilities, hardware attacks, or through guessing someone’s username and password
Intruders
What are the four types of threats that may arise:?
_____ is the degree of weakness in a network or a device.
Vulnerability
What are the three primary vulnerabilities or weakness?
might include TCP/IP Protocol weaknesses, Operating System Weaknesses, and Network Equipment weaknesse
Technological Vulnerabilities
might include unsecured user accounts, system accounts with easily guessed passwords, misconfigured internet services, unsecure default settings, and misconfigured network equipment.
Configuration Vulnerabilities
might include lack of a written security policy, politics, lack of authentication continuity, logical access controls not applied, software and hardware installation and changes not following policy, and a nonexistent disaster recovery plan.
Security Policy Vulnerabilities
If network resources can be physically compromised, a ______ can deny the use of network resources.
threat actor
What are the four classes of physical threats
This includes physical damage to servers, routers, switches, cabling plant, and workstations.
Hardware Threats
This includes temperature extremes (too hot or too cold) or humidity extremes (too wet or too dry).
Environmental Threats
This includes voltage spikes, insufficient supply voltage (brownouts), unconditioned power (noise), and total power loss.
Electrical Threats
-This includes poor handling of key electrical components (electrostatic discharge), lack of critical spare parts, poor cabling, and poor labeling.
Maintenance Threats
_____ is short for malicious software
Malware
It is code or software specifically designed to damage, disrupt, steal, or inflict “Bad” or illegitimate action on data, hosts, or networks.
Malware
What are the various types of malware:
A _____ is a type of malware that propagates by inserting a copy of itself into, and becoming part of, another program.
Viruses
It spreads from one computer to another, leaving infections as it travels.
Viruses
_____ are similar to viruses in that they replicate functional copies of themselves and can cause the same type of damage
Computer worms
In contrast to viruses, which require the spreading of an infected host file, ____ are standalone software and do not require a host program or human help to propagate.
worms
It is a harmful piece of software that looks legitimate. Unlike viruses and worms, _____ do not reproduce by infecting other files. They self-replicate
Trojan horses
_____ must spread through user interaction such as opening an email attachment or downloading and running a file from the internet.
Trojan horses
What are some classified network attacks: