ITM 301 Lecture Notes - Lecture 10: Ip Address, Ftps, Port Scanner
Document Summary
Assess a network"s security needs and vulnerabilities. Describe security risks associated with people, hardware, software, and internet access. Discuss the elements of an effective security policy. Apply appropriate security measures and devices when designing a network. Posture assessment: a thorough examination of each aspect of the network to determine how it might be compromised, should be performed at least annually. Security audit: an assessment performed by a company that has been accredited by an agency that sets network security standards. Hacker: individual who gains unauthorized access to systems. Vulnerability: weakness of a system, process, or architecture. Exploit: means of taking advantage of a vulnerability. Zero - day exploit or zero - day attack: taking advantage of undiscovered software vulnerability, most vulnerabilities are well known. Half of all security breaches: human errors, ignorance, omissions. Social engineering: strategy to gain password. Phishing: glean access, authentication information, pose as someone needing information. Easiest way to circumvent network security: take advantage of human error.