12 - Network Security Basics Flashcards
What are the three general goals of adversaries?
access to information
modification of information
denial of access to information
What is an adversary?
An entity that poses a threat to the operation of a network device
What is a passive attack?
do not modify data and typically involve the monitoring of data flows between systems
ie packet sniffing
What is an active attack?
typically modify or disrupt the flow of data
ie denial of service attack
What is a close-in attack?
those that rely on the close physical proximity of the attacker to the target system
ie an attacker watching a user type in a password
What is an insider attack?
involves a user that normally has some form of access to the target system
ie employee transferring confidential data
What is a distribution attack?
occurs when a malicious user modifies hardware or software prior to installation
ie a software backdoor created by the vendor
What are the four types of physical threats to a network?
electrical
hardware
environmental
administrative
What are the two most threatening types of environmental threats?
temperature
humidity
What are some tools used in a reconnaissance attack?
ping sweeps
packet sniffing
port scans
What is promiscuous mode?
it will no longer ignore data that is no specifically addressed to the device
What is an access attack?
used to gain unauthorized access to network systems
What are some tools used to protect assets in a network?
antivirus software
antispyware software
ids and ips
firewalls
What banner is always displayed prior to login?
the login banner
What banner is displayed prior to login for telnet but not ssh?
the MOTD or message of the day banner
What banner is displayed prior to the login banner?
MOTD banner
What banner is displayed once the user successfully authenticates?
exec banner
What are the three types of warning banners?
login banner
exec banner
motd banner
What is the command for banner logins?
banner motd
banner login
banner exec
What is the command for reverse telnet sessions?
banner incoming
What command is needed for the password command to work on vty, aux, or console sessions?
login
What command is needed to encrypt passwords on a cisco device?
service password-encryption
What command is needed for the password command to work on vty, aux, or console sessions?
login local
What are the three phases of AAA?
Authentication-verifying a users identity
authorization-verifying the level of access for a user
accounting-process of recording the use of resources