A unified threat management (UTM) device is a device that consolidates many security functions or systems into a single system that may be put at a single location throughout the whole network. This UTM would replace the following: (A) a firewall; (B) an intrusion detection device; (C) an intrusion protection device; and (D) antivirus protection.
Threat vectors are the paths or means by which malicious attacks can pass the system's defenses and enter the network. Email-based attacks and malicious attachments target the email threat vector.
Platform as a Service (PaaS) is a cloud computing model in which a third-party provider sends hardware and software tools to users over the internet. Providers of PaaS host hardware and software on their infrastructure. As a result, PaaS frees developers from needing to install in-house hardware and software to build or execute a new application.
By changing the ARP cache, ARP poisoning is the process of adding bad entries to machines.
Google Hacking is a footprinting technique that was made popular by Johnny Long in 2004. It involves changing a search string to look for vulnerabilities.
A threat is anything that has the potential to compromise the CIA triads of secrecy, integrity, and availability. Any occurrence, event, or incident that has the potential to negatively influence an Information System via illegal access to the computer system, full destruction of the system, disclosure, deletion, or addition of data, and/or denial of service.
When the RST (reset) flag is set, communication is abruptly ended.
DAC Flooding is not a method for sniffing.
The three fundamental principles of information security are Confidentiality, Integrity, and Availability (CIA).
Web spiders are apps that crawl through a website to discover information about it.
Sniffing is the practice of collecting and analyzing packets as they travel via wires or airwaves. Sniffing is also known as wiretapping.