Chapter04 - Security+ Guide to Network Security...

Info iconThis preview shows pages 1–13. Sign up to view the full content.

View Full Document Right Arrow Icon
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 4 Network Vulnerabilities and Attacks
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Security+ Guide to Network Security Fundamentals, Third Edition Objectives Explain the types of network vulnerabilities List categories of network attacks Define different methods of network attacks 2
Background image of page 2
Security+ Guide to Network Security Fundamentals, Third Edition Network Vulnerabilities There are two broad categories of network vulnerabilities: Those based on the network transport media (packets on the netowork) Those found in the network devices themselves 3
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Security+ Guide to Network Security Fundamentals, Third Edition Media-Based Vulnerabilities Monitoring network traffic Helps to identify and troubleshoot network problems Monitoring traffic can be done in two ways Use a switch with port mirroring To redirect traffic that occurs on some or all ports to a designated monitoring port on the switch Install a network tap (test access point) A separate device that can be installed between two network devices, such as a switch, router, or firewall, to monitor traffic 4
Background image of page 4
Security+ Guide to Network Security Fundamentals, Third Edition 5
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Security+ Guide to Network Security Fundamentals, Third Edition 6
Background image of page 6
Security+ Guide to Network Security Fundamentals, Third Edition 7 Media-Based Vulnerabilities (continued)
Background image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Security+ Guide to Network Security Fundamentals, Third Edition Media-Based Vulnerabilities (continued) Just as network taps and protocol analyzers can be used for legitimate purposes They also can be used by attackers to intercept and view network traffic Attackers can access the wired network in the following ways: False ceilings Exposed wiring Unprotected RJ-45 jacks 8
Background image of page 8
Security+ Guide to Network Security Fundamentals, Third Edition 9 Media-Based Vulnerabilities (continued)
Background image of page 9

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Security+ Guide to Network Security Fundamentals, Third Edition Network Device Vulnerabilities Weak passwords A password is a secret combination of letters and numbers that serves to authenticate (validate) a user by what he knows Password paradox Lengthy and complex passwords should be used and never written down It is very difficult to memorize these types of passwords Passwords can be set to expire after a set period of time, and a new one must be created 10
Background image of page 10
Security+ Guide to Network Security Fundamentals, Third Edition Network Device Vulnerabilities (continued) Characteristics of weak passwords A common word used as a password Not changing passwords unless forced to do so Passwords that are short Personal information in a password Using the same password for all accounts Writing the password down 11
Background image of page 11

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Security+ Guide to Network Security Fundamentals, Third Edition Network Device Vulnerabilities (continued) Default account A user account on a device that is created automatically by the device instead of by an administrator Used to make the initial setup and installation of the
Background image of page 12
Image of page 13
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 51

Chapter04 - Security+ Guide to Network Security...

This preview shows document pages 1 - 13. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online