IT Examiner School, Seaside, CA

Network Security Assessments • Crucial to determining if networks are safe or have potential for compromise • Two key methods (discussed in Audit): – Network Vulnerability Assessment – Penetration Test • Network scanning (active): – Identify active “hosts” on a network (authorized) – Alerts when unauthorized device is detected

Malware/Virus • Malware:

– Program of file considered harmful – Gathers information w/out permission – Includes - viruses, worms, Trojan horses, etc. • Virus:

– Code that replicates by being copied – Active immediately or lay dormant – Could be harmless and/or destructive – If it replicates itself as email attachment - it is referred to as a Worm

Made with FlippingBook - Online catalogs