Systems software L2 Identifying and preventing vulnerabilities Quiz

Descrição

Systems software L2 Identifying and preventing vulnerabilities
Sam Houghton
FlashCards por Sam Houghton, atualizado more than 1 year ago
Sam Houghton
Criado por Sam Houghton mais de 7 anos atrás
5
0

Resumo de Recurso

Questão Responda
What is Penetration testing IN COMPUTER SCIENCE SYSTEM SECURITY? Pen’ testing is the practice of deliberately trying to find security holes in your own systems The goal of penetration testing is to: identify the targets of potential attacks identify possible entry points attempt to break in report back the findings
What is black box testing? In black box testing, testers are given no more information than any potential hacker may have
What is white box testing? In white box testing, testers are given as much information as an ‘insider’ may have, in order to determine how much damage a rogue employee could do to a system
What is Ethical hacking and the the difference between White-hat and Black-hats? Hackers can be split into different camps based on their motives Traditionally, the media focuses on black-hat hackers with criminal intent ‘White-hats’ are ethical hackers, employed to put their expertise to good in finding system vulnerabilities before the ‘black-hats’ abuse them They are usually employed by companies or security firms
What are Grey-hat hackers? ‘Grey-hats’ fall somewhere in between black and white hats Grey hats will frequently seek out system vulnerabilities without authorisation from the system owners Any flaws they find may either be reported for a ‘ransom’ fee or broadcast on the Internet without actually doing anything to take advantage of the flaws themselves
What are Audit trails? Audit trails are useful for maintaining security and for recovering lost data Data that is commonly recorded can tell you: Who attempted access? – Usernames and IP addresses What did they do? - Download, view, delete or modify data Where did they look? – Which computers were accessed? When did they do it? – Creates a timeline of events Why did they do it? – Motives may begin to emerge
This is not finished! This is not finished!

Semelhante

Systems Software
Aaishah Ravat
Systems Software
George Buznea
Systems Software
Brokoli Momkey
Simulado ExamTime
Alessandra S.
Português - Gramática
Nikita Northman
16 Dicas para o Professor Criativo
Alessandra S.
Como criar um Mapa Mental
Alessandra S.
NOÇÕES DE INFORMÁTICA
Viviana Veloso
Formas de tratamiento en español: Formal e Informal.
walescabraga
Conjuntos Numéricos
carllosrochab
Patologia Geral - Hipertensão Arterial (Geral)
BrienneC