Skip to Main Content
Network and Data Security for Non-Engineers
book

Network and Data Security for Non-Engineers

by Frank M. Groom, Kevin Groom, Stephan S. Jones
August 2016
Beginner content levelBeginner
257 pages
8h 59m
English
Auerbach Publications
Content preview from Network and Data Security for Non-Engineers

Appendix: End of Chapter Question Answers

Chapter 2: The Anthem Break-in Case Study

1.  

a.  Spear phishing

b.  Waterholes

2.  

a.  Enterprise Compromise Assessment Tool (ECAT) scanning software

3.  

a.  The China Chopper web shell

4.  

a.  They use the Sticky Keys trick to modify the registry on the target’s system server.

5.  

a.  It’s a network of virtual tunnels that is used to hide websites from each other and outsiders.

6.  

a.  Control and relay packets. Tor packets set up an anonymous path. The path sets up links in sequence, and when it is finished, hackers send relay packets containing malware, code, and software to the target site.

7.  

a.  The process of encapsulating a transmitted message in a series of encrypted IP addressing layers ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Network Security Strategies

Network Security Strategies

Aditya Mukherjee

Publisher Resources

ISBN: 9781315350219