Security+ Certification Training Kit (Pro-Certification)

Lesson 3: Intrusion Points

Intrusion points are areas that provide an access point to your company's information. Some of these are obvious, but others are not. For instance, you might realize that you need to install a firewall to protect the internal network and computers from hackers, but if a hacker took a temporary job at your company, the firewall would be of little use. When identifying intrusion points, you must consider internal threats as well as external threats. Some internal and external access points are as follows:


After this lesson, you will be able to

Estimated lesson time: 15 minutes


Network Infrastructure

Your network infrastructure is all of the wiring, networking devices, and networking services that provide connectivity between the computers in a network. The network infrastructure also provides a way to connect to the Internet, allows people on the Internet to connect to your network, and provides people who work remotely with methods to connect to your network.

Intrusion points provide a place for someone to penetrate your network communications and gain access to the information you have stored on your computers. Examples of how an intruder might exploit the network infrastructure include the following:

Applications Used on the Internet

Almost anyone who has a computer connects to the Internet to visit Web sites, check e-mail, and send instant messages to friends. It is also becoming more common to check credit card accounts and bank accounts across the Internet.

Each of these tasks is accomplished using an application running on your computer that allows you to interact with other computers on the Internet. There is a risk associated with providing this additional functionality. Some of the ways an intruder could exploit the applications for less-than-altruistic reasons include the following:

Communications Protocols

TCP/IP is the protocol suite used for communications on the Internet. Some attacks work by modifying the structure of the IP packet, but many successful intrusions occur at higher levels in the TCP/IP stack. For instance, an intruder can exploit a Web server using the Hypertext Transfer Protocol (HTTP). Communications protocols provide a common set of rules that computers use when communicating with each other. Some protocols offer no security, whereas others provide varying degrees of security. Intruders use their knowledge of communications protocols to compromise your C-I-A triad. The following are two examples:

Lesson Review

The following questions are intended to reinforce key information presented in this lesson. If you are unable to answer a question, review the lesson and then try the question again. Answers to the questions can be found in Appendix A, "Questions and Answers."

  1. Your company has a high-speed Internet connection that can be used to access the Internet and allows people on the Internet to access your company's Web site. Each user also has a modem that he or she can use for Internet access in case the high-speed connection fails. Users can select the Web browser they want to use and are allowed to manage their own computers. Which of the following are intrusion points for the hacker?

    1. The high-speed connection

    2. The Web browser on each of the client's computers

    3. The modem that each user has

    4. The Web server for your company's Web site

  2. When accessing Web sites, an intruder might exploit a Web server using the HTTP protocol. (True or False?)

  3. It is always better to have several access points to the Internet so that if a hacker takes one down your company still has access. (True or False?)

Lesson Summary

Категории