Social engineering
Anonymous keylogging
Spam
DDoS
Ensuring that each use of an access card allows access to only one user at the time
Ensuring that all operating system and antivirus software is up to date
Encrypting all sensitive data stored on the servers
Performing daily data backups
Registering and escorting all visitors to the premises
Perform daily data backups.
Replace any software firewalls with a hardware firewall.
Implement biometric authentication.
Ensure that all operating system and antivirus software is up to date.
Disable the autorun feature in the operating system.
Biometric authentication
Trusted Platform Module (TPM)
Card key access
Two-factor security
Set virus protection software to scan removable media when data is accessed.
Configure the Windows Firewall to block the ports that are used by viruses.
Enable the TPM in the CMOS settings.
Repair, delete, or quarantine the infected files.
Disable the autorun feature in the operating system.
When unauthorized users have changed the CMOS settings and the CMOS password must be reset
When a virus has damaged the master boot record of the system disk
When a virus has damaged the boot sector of the system disk
When the folder permissions for user members of a group are incorrect
Set the user folder permissions to Deny.
Disable the users’ accounts.
Change the user file permissions to Read Only.
Enable UAC on the computer.
Use data wiping.
Drill through the HDD.
Smash the platters with a hammer.
Immerse the HDD in a weak solution of bicarbonate of soda.
WPA2
SSID hiding
WEP
Wireless MAC filtering
A token
A TPM
A private key
A DES key
A public key
Hides in a dormant state until needed by an attacker
Infects computers by attaching to software code
Executes when software is run on a computer
Is self-replicating
Travels to new computers without any intervention or knowledge of the user
Worm
Phishing
Adware
Stealth virus
What are the possible threats to the assets of the organization?
What is to be done in the case of a security breach?
When do the assets need protecting?
What assets require protection?
What insurance coverage is required?
A service pack
Patterns in the programming code of the software on a computer
Mirror sites
Patches that prevent a newly discovered virus or worm from making a successful attack
Any traffic that is using port 25 going out of the internal network will also be allowed to transmit out port 113.
All traffic that is sent into port 25 to the internal network will also be allowed to use port 113.
All traffic that is sent out port 25 will open port 113 to allow inbound traffic into the internal network through port 113.
Any traffic that comes into port 25 allows outgoing port 113 to be used.
Packet size
Physical addresses
Protocols
Packet speed
Ports
To facilitate access to external networks
To prevent the target server from being able to handle additional requests
To scan the data on the target server
To obtain all addresses in the address book within the server
Have you scanned your computer recently for viruses?
What symptoms are you experiencing?
Did you open any attachments from a suspicious email message?
Is your security software up to date?
Install rogue antivirus software on the host.
Log on to the host as a different user.
Disable ActiveX and Silverlight on the host.
Disconnect the host from the network.
Ensure the security policy is being enforced.
Check the computer for the latest OS patches and updates.
Scan the computer with protection software.
Verify the physical security of all offices.
A virus has damaged the boot sector of the system disk.
The computer has been infected with spyware.
UAC has been disabled on the computer.
Folder permissions have been changed from Deny to Allow.
Mirrors
Signatures
Virus definition tables
Grayware
Wait!
Here's an interesting quiz for you.