Get Latest Exam Updates, Free Study materials and Tips
a). Malware: Malware is a term used to describe malicious software,
including spyware, ransomware, viruses, and worms. Malware breaches a network through a
vulnerability, typically when a user clicks a dangerous link or email attachment that then
installs risky software.
b). Phishing: Phishing is the practice of sending fraudulent communications that
appear to come from a reputable source, usually through email. The goal is to steal sensitive
data like credit card and login information or to install malware on the victim’s machine.
Phishing is an increasingly common cyberthreat.
c). Man-in-the-middle attack: Man-in-the-middle (MitM) attacks, also known as
eavesdropping attacks, occur when attackers insert themselves into a two-party transaction.
d). Denial-of-service attack(DDoS): A denial-of-service attack floods systems,
servers, or networks with traffic to exhaust resources and bandwidth. As a result, the system is
unable to fulfill legitimate requests. Attackers can also use multiple compromised devices to
launch this attack.
e). SQL injection: SQL Injection (SQLi) is an injection attack where an attacker
executes malicious SQL statements to control a web application’s database server, thereby
accessing, modifying and deleting unauthorized data. SQL Injection attack is one of the popular
ways of targeting databases.
f). Zero-day exploit: A zero-day exploit hits after a network vulnerability is
announced but before a patch or solution is implemented. Attackers target the disclosed
vulnerability during this window of time. Zero-day vulnerability threat detection requires
constant awareness.
g). Cross Site Scripting: XSS attacks occur when a web app sends malicious code in
the form of a side script to another user thus bypassing access controls of the site to same as
the origin.
h). Cryptojacking: It is a specialized attack that involves getting someone else's
computer to do the work of generating cryptocurrency for you.
Vulnerability is a weakness which can be exploited by an attacker to perform unauthorized actions within a computer system. It is a flaw in a system that can leave it open to attack.
Prevent it: by blocking the attack or closing the vulnerability.
Deter it: by making the attack harder but not impossible
Deflect it: by making another target more attractive
Detect it: either as it happens or some time after the fact
Recover from its effects.
The process by which resources or services are granted or denied on a computer system or network.
Computer access control can be accomplished by one of three entities: hardware, software, or a
policy Access control can take different forms depending on the resources that are being
protected
a). Identification: A user accessing a computer system would present credentials or
identification, such as a username
b). Authentication: Checking the user’s credentials to be sure that they are
authentic and not fabricated
c). Authorization: Granting permission to take the action
d). Granted access: To only certain services or applications in order to perform
their duties
Provides a predefined framework for hardware and software developers who need to
implement access control in their devices or applications
a). Discretionary Access Control (DAC): A subject has total control over any objects
that he or she owns, Along with the programs that are associated with those objects. In the DAC
model, a subject can also change the permissions for other subjects over objects
b). Mandatory Access Control (MAC): The end user cannot implement, modify, or
transfer any controls The owner and custodian are responsible for managing access controls. It
is based on security labels. Subjects are given security clearance and objects are classified
into (secret, top secret, confidential, etc.) . The benefits of MAC based access control is that
it cannot be over written or bypassed and it strongly enforces all requests.
c). Role Based Access Control (RBAC): Also called the Rule-Based Role-Based Access
Control (RB-RBAC) model or automated provisioning Can dynamically assign roles to subjects based
on a set of rules defined by a custodian Each resource object contains a set of access
properties based on the rules. it is also called as Non-Discretionary Access Control Considered
a more “real world” approach than the other models . Assigns permissions to particular roles in
the organization, and then assigns users to that role Objects are set to be a certain type, to
which subjects with that particular role have access.
d). Bell LaPadula Model: The Bell-LaPadula security model deals with the
preservation of confidentiality. It was originally defined by Department of Defense in Trusted
Computer System Evaluation Criteria which is US Government standard that sets basic requirements
for assessing the effectiveness of computer security controls.
e). Attribute-based access control (ABAC): A methodology that manages access rights
by evaluating a set of rules, policies and relationships using the attributes of users, systems
and environmental conditions.
f). Remote Authentication Dial-In User Service (RADIUS): a networking protocol,
operating on port 1812 that provides centralized Authentication, Authorization, and Accounting
(AAA or Triple A) management for users who connect and use a network service.
g). Terminal Access Controller Access-Control System (TACACS):
1). Extended TACACS (XTACACS) is a proprietary extension to TACACS introduced
by Cisco Systems in 1990 without backwards compatibility to the original protocol. TACACS and
XTACACS both allow a remote access server to communicate with an authentication server in order
to determine if the user has access to the network.
2). Terminal Access Controller Access-Control System Plus (TACACS+) is a
protocol developed by Cisco and released as an open standard beginning in 1993. Although derived
from TACACS, TACACS+ is a separate protocol that handles authentication, authorization, and
accounting (AAA) services. TACACS+ and other flexible AAA protocols have largely replaced their
predecessors.
Not a member yet? Register now
Are you a member? Login now