From the lists below, for each list, select three terms, concepts or analysis from each list (that’s 15 total), and write 1 paragraph for each (that’s 15 paragraphs). List 1: Database Database management system (DBMS) Structured query language (SQL) Relational database Table of data consisting of rows (tuples) and columns (attributes) Primary and Foreign Keys Database access control List 2: Malicious software (malware) Terminology for malicious software Viruses –mechanism, trigger, payload dormant, propagation, triggering, and execution phases Boot sector infector Polymorphic, and metamorphic viruses worms Scanning/fingerprinting Spam e-mail/trojans – social engineering System corruption Bots Remote control (command and control) Phishing Backdoor/trapdoor Rootkit Countermeasures List 3: Denial-of-service (DoS) attacks Distributed DDoS attacks Reflection attacks Amplification attacks DNS amplification attacks Application-based bandwidth attacks SIP flood HTTP-based attacks Defenses against DoS attacks List 4: Intruders Masquerader Misfeasor Clandestine user Criminal enterprise ($) Internal threat Security intrusion/intrusion detection SIEM Software Intrusion detection systems (IDS) Host-based IDS Network-based IDS Honeypots Sensors, analyzers, user interface List 5: Firewall types and locations Packet vs. Stateful Proxy Servers (App and Circuit) Firewall locations and configurations Demilitarized Zone (DMZ) Virtual Private Networks (VPN) Firewall restrictions (external vs. internal) Host-based IDS Network-based IDS Know figure 9.2 Word Bank Attack Reaction “defense in depth” Bastion host Blended attack Dentralized Centralized Flooding Computer Emergency Response Teams (CERTs)
From the lists below, for each list, select three terms, concepts or analysis from each list (that’s 15 total), and write 1 paragraph for each (that’s 15 paragraphs).
List 1:
Database management system (DBMS)
Structured query language (SQL)
Relational database
Table of data consisting of rows (tuples) and columns (attributes)
Primary and Foreign Keys
Database access control
List 2:
Malicious software (malware)
Terminology for malicious software
Viruses –
dormant, propagation, triggering, and
execution phases
Boot sector infector
Polymorphic, and metamorphic viruses
worms
Scanning/fingerprinting
Spam e-mail/trojans – social engineering
System corruption
Bots
Remote control (command and control)
Phishing
Backdoor/trapdoor
Rootkit
Countermeasures
List 3:
Denial-of-service (DoS) attacks
Distributed DDoS attacks
Reflection attacks
Amplification attacks
DNS amplification attacks
Application-based bandwidth attacks
SIP flood
HTTP-based attacks
Defenses against DoS attacks
List 4:
Intruders
Masquerader
Misfeasor
Clandestine user
Criminal enterprise ($)
Internal threat
Security intrusion/intrusion detection
SIEM Software
Intrusion detection systems (IDS)
Host-based IDS
Network-based IDS
Honeypots
Sensors, analyzers, user interface
List 5:
Firewall types and locations
Packet vs. Stateful
Proxy Servers (App and Circuit)
Firewall locations and configurations
Demilitarized Zone (DMZ)
Virtual Private Networks (VPN)
Firewall restrictions (external vs.
internal)
Host-based IDS
Network-based IDS
Know figure 9.2
Word Bank
Attack Reaction
“defense in depth”
Bastion host
Blended attack
Dentralized
Centralized
Flooding
Computer Emergency Response Teams (CERTs)
Trending now
This is a popular solution!
Step by step
Solved in 2 steps