3-Network Security Flashcards
Networks based threats
a threat may have the ability to disrupt network communications, or be able to intercept communications in order to acquire sensitive information.
spoofing
This is the act of changing the configuration of a device or system in an attempt to masquerade as a different, known, and trusted system.
Access bypass
An individual can attach an unauthorized access device, such as a Wi-Fi access point or a dial-in modem, to the network, thereby permitting himself (or others) to access the network while bypassing security controls.
Man-in-the-browser attack
This attack involves the installation of a malicious “browser helper object” (BHO) onto a victim’s browser. The malicious BHO alters communication between the browser and the Internet without the victim’s knowledge.
Drive-by-attack
malware loaded on websites, that are in turn installed on site’s visitor computer
What attacks are propagated via email
Spam, phishing, pharming, and malware
What is a pharming attack
Pharming is a scamming practice in which malicious code is installed on a personal computer or server, misdirecting users to fraudulent Web sites without their knowledge or consent. Pharming has been called “phishing without a lure.”
Phishing
The fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers
Network Security Countermeasures - NSC
Controls to ensure the integrity and security of a network as one layer of defense in the protection of valuable or sensitive information.
They include: User authentication controls/Machine authentication controls/Anti-Malware/Encryption/ switched networks/IDS/IPS etc.
Machine Authentication controls
Ensure that only organization-managed devices can attach to the network.
IEEE 802.1X technology is used to enforce machine authentication controls.
Encryption controls
Tunnels between pairs of servers can be established at the OS level using IPsec or SSH
Tunnels between networks can be established using IPsec between pairs of routers
switched networks controls
With switched networks, only traffic that a node sees are packets sent explicitly to or from the node, as well as some broadcast traffic. This greatly reduces the risk of eavesdropping, since it may not be practical to encrypt all communications.
IDS
Systems used to detect anomalous activities on the network, sending alerts to appropriate personnel when these alerts occur.
Type os IDS
- Network based IDS - Usually takes the form of network appliances
- Host based IDS - Software agent installed on each host and a separate managemnet console
Snort
An Open source IDS, a software istalled on a server to monitor incoming tarffic.