Networking

Submitted by: Submitted by

Views: 10

Words: 821

Pages: 4

Category: Science and Technology

Date Submitted: 04/24/2016 06:42 PM

Report This Essay

Nolen Hodges

Chapter 1

1/29/16

1. Information security is the protection of information and its critical elements, including the systems and hardware that use, store, and transmit that information. Information security and network security don’t differ that much. Network security protects the network from unauthorized accesses. They go hand-in-hand with your system. If the network is unsecure, then the information is unsecure.

2. Confidentiality, integrity, and availability are the components of the C.I.A. triad.

3. A threat presents itself as dangerous, while an attack causes damage to or otherwise compromise the information and/or the systems that support it.

4. IP scan and attack, web browsing, virus, unprotected shares, mass mail, and Simple Network Management Protocol (SNMP) are vectors that malicious code uses to infect or compromise other systems.

5. Viruses, worms, Trojan horses, maintenance hook, and rootkit are types of malware. Viruses are segments of code that perform malicious actions, while worms are malicious programs that replicate themselves constantly without requiring another program to provide a safe environment for replication. Trojan horses don’t carry viruses or worms.

6. The unlawful use or duplication of software-based intellectual properties are examples of violations.

7. An exploit is a technique used to compromise a system, while vulnerabilities are weaknesses or faults in a system or protection mechanism that open it to the possibility of attack or damage.

8. Rainbow Tables, Brute Force Attacks, Dictionary Attack, Denial-of-Service Attack, Distributed Denial-of-Service Attack, Spoofing, Man-in-the-Middle Attacks, E-mail Attacks, Spam, Mail Bomb, Sniffers, Social Engineering, Buffer Overflow, and Timing Attacks are types of password attacks.

9. A Distributed Denial-of-Service (DDoS) launches a coordinated stream of requests against a target from many locations at the same time, while a Denial-of-Service attacker sends...