What are the six security levels? Provide examples of threat categories, attacker profiles, and types of attacks.
What will be an ideal response?
The six security levels are physical security, network security, application security, file security, user security, and procedural security. The following is a list of issues that pertain to each security level:
Physical Security Issues
• Computer room security
Biometric scanning systems
Motion sensors
• Servers and desktop computers
• Keystroke loggers
• Tamper-evident cases
• BIOS-level passwords; boot-level passwords; power-on passwords
• Notebook computers
Universal Security Slot (USS)
Tracking software
Stringent password requirements
Account lockout thresholds
Network Security Issues
• Encrypting network traffic
Encryption vs. plain text]
Public key encryption
Wi-Fi Protected Access (WPA and WPA2)
Wired Equivalent Privacy (WEP)
• Private networks
Tunnels
• Virtual private networks
• Ports and services
Destination ports
Services
Port scans
Denial of service attacks
• Firewalls
Protocols that control traffic
Application Security Issues
• Services
Security holes
Permissions
• Input validation
• Patches and updates
File Security Issues
• Permissions
• User groups
User Security Issues
• Identity management
• Password protection
• Social engineering
• User resistance
Procedural Security Issues
• Managerial policies and controls
• Corporate culture that stresses security
• Define how particular tasks are to be performed
• Employee responsibility for security
• Dumpster diving
• Use of paper shredders
• Classification levels.
An attack is a hostile act that targets the system, or the company itself. Thus, an attack might be launched by a disgruntled employee, or a hacker who is 10,000 miles away. Attackers break into a system to cause damage, steal information, or gain recognition, among other reasons. Attackers typically can be identified by one or more the profiles shown in Figure 12-21.
You might also like to view...
A for each in array statement must specify the type of the values stored in the array that will be processed.
Answer the following statement true (T) or false (F)
How do job objects facilitate resource management for servers?
a) A server can group all the processes dedicated to servicing a client’s request (or all clients’ requests) in a job object and restrict the resources (e.g., processor time and working set size) allocated to those processes. b) A server can queue work items to a job object, which dispatches one of its dedicated system worker threads to fulfill the request. This frees the server from unnecessarily creating and terminating threads for each client request. c) A server can register a job object with an I/O completion port. When an I/O for a file associated with the port completes, the job object dispatches one of its dedicated system worker threads to complete I/O processing, freeing the server from this responsibility. d) all of the above
Convert decimal 299 to binary, to octal, and to hexadecimal.
What will be an ideal response?
____ images are provided at little or no cost by the owner.
A. Editorial-rights B. Royalty-free C. Rights-protected D. Public domain