Академический Документы
Профессиональный Документы
Культура Документы
What are some types of network Viruses, worms, and Trojan Horses are
attacks? specific types of network attacks. More
generally, network attacks are classified
as reconnaissance, access, or Denial of
Service attacks
What are the two main types of Spoofing attacks where one device
internal threats to the network? attempts to pose as another by falsifying
data.
DoS attacks make computer resources
unavailable to intended users.
1.1.2 What is a hacker? Bad or Good Bad hackers work to gain unauthorized
access to devices on the Internet or that
run programs to prevent or slow network
access to a large number of users, or
corrupt or wipe out data on servers.
What is the main need for laws Trillions of dollars are transacted over the
safeguarding network security? Internet on a daily basis, and the
livelihoods of millions depend on Internet
commerce.
1.1.3 What are some of the network SysAdmin, Audit, Network, Security
security organizations? (SANS) Institute
Computer Emergency Response Team
(CERT)
International Information Systems Security
Certification Consortium
Mitre Corporation
FIRST
Center for Internet Security (CIS)
Page 3 of 8
CCNA Security Chapter 1
Modern Network Security Threats
from functioning)
Denial of Service Trojan Horse (slows or
halts network activity)
1.2.4 Describe the four phases of worm The response to a worm infection can be
mitigation: broken down into: containment,
inoculation, quarantine, and treatment
phases.
How can DoS or DDoS attacks be IPS and firewalls (Cisco ASAs and ISRs)
mitigated? Anti-spoofing technologies
Quality of Service – traffic policing
Page 7 of 8
CCNA Security Chapter 1
Modern Network Security Threats
Page 8 of 8