IT Examiner School, Providence, RI
Network Security Assessments
Two key methods (discussed in Audit):
Crucial to determining if networks are safe or have potential for compromise
Network scanning (active):
Identify active “hosts” on a network (authorized)
Network Vulnerability Assessment
Alerts when unauthorized device is detected
Penetration Test
Malware/Virus
• Program of file considered harmful • Gathers information w/out permission • Includes ‐ viruses, worms, Trojan horses, etc.
Malware:
• Code that replicates by being copied • Active immediately or lay dormant • Could be harmless and/or destructive • If it replicates itself as email attachment ‐ it is referred to as a Worm
Virus:
Made with FlippingBook Annual report