preview

The Cuckoo's Egg Study Guide

Decent Essays

The Questions:
1. What is a "honeypot"?
Honeypot is usually used as network intrusion detection systems. A honeypot will contain fake/false data and information and performance like a computer or server to trap any unauthorized use of information system. Normally honeypot will be isolated from “real network” and used for monitor and alarm system to alert network administrator if detect any malicious or suspicious activity.
2. What is "blackholing"?
When there is incoming or outgoing traffic is silently discarded or dropped in a network, then blackholing is happening. Blackholing is commonly used to defence against spam or DDOS attack. When there is DDOS attack happen, the Internet Service Provider will blocks the packets from the sources domain …show more content…

Define the term "exploit".
By using the advantage of bug or vulnerability to manipulate a software or system.
15. What is “vulnerability”?
A weakness of a system or a security hole of a system.
16. In 1989 Clifford Stoll wrote a book called "The Cuckoo's Egg". Explain the relevance of the book's title.
Tracking a spy through the maze of computer espionage.
17. Define dictionary attacks and brute force attacks. How are they similar, and different?
Dictionary attacks is an attack that used for defeating a cipher or authentication mechanism by trying to guess its decryption key by using words from dictionary.
Bruce force attack is an attack that systematically checks all possible combination of keys or password until the correct one has being found. Bruce force is more effective on short password.

18. Explain the difference between a penetration test and a security audit.
Penetration test is software testing on a system that looks for security hole or vulnerability. The main goal is to identify the high-risk vulnerabilities and fix it before attacker fined it.
Security audit is a measurable technical assessment of a system. Penetration test is a part of security audit. At the end of security audit process, there will be report-generated use for future reference and mitigation plan if

Get Access