2 cissp ® Official Study Guide Eighth Edition


Malware and Monitoring Devices



Download 19,3 Mb.
Pdf ko'rish
bet658/881
Sana08.04.2023
Hajmi19,3 Mb.
#925879
1   ...   654   655   656   657   658   659   660   661   ...   881
Bog'liq
(CISSP) Mike Chapple, James Michael Stewart, Darril Gibson - CISSP Official Study Guide-Sybex (2018)

Malware and Monitoring Devices
There have been many reported cases of malware being 
installed on systems while employees were visiting a foreign country. Similarly, we have 
heard firsthand accounts of physical monitoring devices being installed inside devices after 
a trip to a foreign country. People might think their devices are safe in a hotel room as they 
go out to a local restaurant. However, this is more than enough time for someone who oth-
erwise looks like hotel staff to enter your room, install malware in the operating system, 
and install a physical listening device inside the computer. Maintaining physical control of 
devices at all times can prevent these attacks. Additionally, security experts recommend 
that employees do not bring their personal devices but instead bring temporary devices to 
be used during the trip. After the trip, these can be wiped clean and reimaged.
Free Wi-Fi
Free Wi-Fi often sounds appealing while traveling. However, it can easily be a 
trap configured to capture all the user’s traffic. As an example, attackers can configure a Wi-Fi 
connection as a man-in-the-middle attack, forcing all traffic to go through the attacker’s sys-
tem. The attacker can then capture all traffic. A sophisticated man-in-the-middle attack can 
create a Hypertext Transfer Protocol Secure (HTTPS) connection between the client and the 
attacker’s system and create another HTTPS connection between the attacker’s system and 
an internet-based server. From the client’s perspective, it looks like it is a secure HTTPS con-
nection between the client’s computer and the internet-based server. However, all the data is 
decrypted and easily viewable on the attacker’s system. Instead, users should have a method of 
creating their own internet connection, such as through a smartphone or with a Mi-Fi device.
VPNs
Employers should have access to virtual private networks (VPNs) that they can use 
to create secure connections. These can be used to access resources in the internal network, 
including their work-related email.

Download 19,3 Mb.

Do'stlaringiz bilan baham:
1   ...   654   655   656   657   658   659   660   661   ...   881




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish