Page 941 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 941

someone inside your organization by convincing employees that they
               are, for example, associated with upper management, technical

               support, or the help desk. The victim is often encouraged to make a
               change to their user account on the system, such as reset their
               password, so the attacker can use it to gain access to the network. The
               primary countermeasure for this sort of attack is user training.

               Explain the concept of security boundaries. A security
               boundary can be the division between one secured area and another

               secured area. It can also be the division between a secured area and an
               unsecured area. Both must be addressed in a security policy.

               Understand the various network attacks and
               countermeasures associated with communications security.
               Communication systems are vulnerable to many attacks, including
               distributed denial of service (DDoS), eavesdropping, impersonation,
               replay, modification, spoofing, and ARP and DNS attacks. Be able to

               supply effective countermeasures for each.
   936   937   938   939   940   941   942   943   944   945   946