IT Examiner School, Palm Springs, CA

Network Security Assessments

Two key methods  (discussed in  Audit):

Crucial to  determining if  networks are  safe or have  potential for  compromise

Network scanning  (active):

Identify active  “hosts” on a  network  (authorized)

Network  Vulnerability  Assessment

Alerts when  unauthorized  device is detected 

Penetration Test

Malware/Virus

• Program of file considered harmful • Gathers information w/out permission • Includes ‐ viruses, worms, Trojan horses, etc.

Malware:

• Code that replicates by being copied • Active immediately or lay dormant • Could be harmless and/or destructive • If it replicates itself as email attachment ‐ it is  referred to as a Worm

Virus:

Made with FlippingBook - professional solution for displaying marketing and sales documents online