worm
exploits vulnerabilities with theintent of propagating itself across a network
Used to combat critical network vulnerabilities
operating system security concerns about vulnerabilities on specific operating system network system security concerns about vulnerabilities of the entire network regrdless how diverse or complex the network is.
Configure routing protocol authentication.
Every network is different; the only way to find out the vulnerabilities in a given network is to initiate an audit of the network. One piece of that is risk assessment, and from that you develop a vulnerability matrix.
Self-propagating systems or malware can initiate and spread without user intervention, often exploiting vulnerabilities in software or networks. Once activated, they replicate themselves across devices or systems, enabling widespread distribution and potential harm. This autonomous behavior allows them to infect multiple targets rapidly, making them particularly dangerous in cybersecurity contexts. Examples include computer viruses and worms that can spread through email attachments or network connections.
An example of a cyber kill chain is the attack on Target in 2013. The attackers began with reconnaissance, identifying vulnerabilities in Target's network. They then delivered malware through a compromised third-party vendor, enabling them to gain access to the network. Finally, they exfiltrated credit card information from POS systems, leading to a significant data breach affecting millions of customers.
True
security audit
The kind of server often used as a launching point into a target's network is the web server. Web servers frequently host applications that may have known vulnerabilities, such as outdated software, misconfigurations, or exposed sensitive data. Attackers exploit these vulnerabilities to gain initial access to the network, allowing them to escalate privileges and move laterally within the system. Regular patching and security assessments are crucial to mitigate these risks.
False. Trackable information will be lost if you reboot.
A botnet is a collection of compromised computers connected to the Internet (each compromised computer is known as a 'bot'). When a computer is compromised by an attacker, there is often code within the malware that commands it to become part of a botnet. The "botmaster" or "bot herder" controls these compromised computers via standards based network protocols such as IRC and http.