vulnerability
flaw that affects security
flaw that affects security
vulnerability
Threat vector
The path that the threat takes to the target
The path that the threat takes to the target
Threat vector
What are some common paths threat vectors can take?
Nmap is a utility used for ________ discovery, administration and security auditing.
network
What is the name of a utility used for network discovery, administration and security auditing?
Nmap
In our Nmap lab we will learn and understand how to:
TCP Connect Scan
Uses a normal TCP connection to determine if a port is available
Xmas Scan
Involves sending TCP segments with the all flags sent in the packet header, generating packets taht are illegal according to RFC 793.
ACK Flag Scan
Involves sending spoofed packets to a target.
Information Security Triad
More secure means harder to use; less functionality
confidentiality
The data is only readable by those authorized
Integrety
The data has not changed
Availability
The data is accessable
Authenticity
The data source is valid
Non repudiation
The data source can not deny it’s creation
What are the five pillars of Information Security?
Confidentiality Integrity Availability Authenticity Non - Repudiation
Common paths threat vectors can take
Nmap can be used for:
Subnet
trace
Nmap can be used for:
packets scan new profile TCP and UDP topology
“A” record (AAAA) A stands for address and this is how we ultimately define a name with an IP address. A IPV4 AAAA IPV6
One of the most common records on the DNS server