In cybersecurity, vulnerability is a weakness that may be exploited by hackers during a cyber assault to gain unauthorized access to a node or computer system or to do unauthorized operations. Vulnerabilities can allow attackers to do the following: run code, access a system's memory, install malware & to steal, destroy or modify sensitive data.
The three extra properties that Parker added to CIA TRIAD are: Possession (or Control), Authenticity and Utility
In a Local Area Network (LAN), a bus topology is one in which all the nodes, hosts, or computers are connected to a single cable. Backbone refers to the cable to which nodes, hosts, or computers connect. If this backbone breaks, communication across the entire segment fails, which means no hosts can communicate.
Integrity is characterized as follows: (I) It is intended to safeguard critical data against unauthorized deletion, addition, or alteration. (II) It assures that if an authorized individual makes a change that should not have been made, the damage may be undone.
The word Threat Agent refers to an individual or organization capable of planning, manifesting, and executing a threat. It is vital to identify who might wish to exploit an organization's assets or secrets and how they would use this information against the business.
The version field in the IP header shows that the IP version of the packet under examination is present. This parameter displays the number 4 when IPv4 is enabled. The header length is specified as the length of the header and has values between 20 and 60 bytes in 32-bit words.
A race condition is a programmed situation or condition in which one function or thread writes or generates data while another function or thread reads that data. If they are not closely synchronized, the data may be read before it is written. There is also a possibility that they altered the data between writing and reading.
A security policy is a declaration of purpose or set of written rules pertaining to the resources and organizational structure of an organization or corporation. It explains the following: - What a company considers for security enhancement, what resources require protection, how resources should be utilized and how resources may or should be accessed.
The most used security protocol, Secure Sockets Layer/Transport Layer (SSL/TLS), is used for web-based communication encryption. A collection of methods, rules, and procedures for encrypting sensitive information. SSL and TLS both explain how to generate encryption keys from critical, well-known data and incomplete data that is transmitted from one side to another.
When two or more fundamental network topologies (such as star and mesh) are interconnected, a hybrid network topology is produced. The resulting topology will have features of all the topologies that are part of a hybrid topology. This will make each topology less limited by its own weaknesses.
The Media access control (MAC) address is represented or stated using hexadecimal numbers since it is the most convenient way to represent octets. A pair of hexadecimal numbers will encompass the whole range of anticipated byte values, i.e., 00 is 0 and ff is 255.