ITM 301 Lecture Notes - Lecture 10: Ip Address, Ftps, Port Scanner

113 views18 pages

Document Summary

Assess a network"s security needs and vulnerabilities. Describe security risks associated with people, hardware, software, and internet access. Discuss the elements of an effective security policy. Apply appropriate security measures and devices when designing a network. Posture assessment: a thorough examination of each aspect of the network to determine how it might be compromised, should be performed at least annually. Security audit: an assessment performed by a company that has been accredited by an agency that sets network security standards. Hacker: individual who gains unauthorized access to systems. Vulnerability: weakness of a system, process, or architecture. Exploit: means of taking advantage of a vulnerability. Zero - day exploit or zero - day attack: taking advantage of undiscovered software vulnerability, most vulnerabilities are well known. Half of all security breaches: human errors, ignorance, omissions. Social engineering: strategy to gain password. Phishing: glean access, authentication information, pose as someone needing information. Easiest way to circumvent network security: take advantage of human error.

Get access

Grade+
$40 USD/m
Billed monthly
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
10 Verified Answers
Class+
$30 USD/m
Billed monthly
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
7 Verified Answers

Related Documents