3-Network Security Flashcards

1
Q

Networks based threats

A

a threat may have the ability to disrupt network communications, or be able to intercept communications in order to acquire sensitive information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

spoofing

A

This is the act of changing the configuration of a device or system in an attempt to masquerade as a different, known, and trusted system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Access bypass

A

An individual can attach an unauthorized access device, such as a Wi-Fi access point or a dial-in modem, to the network, thereby permitting himself (or others) to access the network while bypassing security controls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Man-in-the-browser attack

A

This attack involves the installation of a malicious “browser helper object” (BHO) onto a victim’s browser. The malicious BHO alters communication between the browser and the Internet without the victim’s knowledge.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Drive-by-attack

A

malware loaded on websites, that are in turn installed on site’s visitor computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What attacks are propagated via email

A

Spam, phishing, pharming, and malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a pharming attack

A

Pharming is a scamming practice in which malicious code is installed on a personal computer or server, misdirecting users to fraudulent Web sites without their knowledge or consent. Pharming has been called “phishing without a lure.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Phishing

A

The fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Network Security Countermeasures - NSC

A

Controls to ensure the integrity and security of a network as one layer of defense in the protection of valuable or sensitive information.

They include: User authentication controls/Machine authentication controls/Anti-Malware/Encryption/ switched networks/IDS/IPS etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Machine Authentication controls

A

Ensure that only organization-managed devices can attach to the network.

IEEE 802.1X technology is used to enforce machine authentication controls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Encryption controls

A

Tunnels between pairs of servers can be established at the OS level using IPsec or SSH

Tunnels between networks can be established using IPsec between pairs of routers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

switched networks controls

A

With switched networks, only traffic that a node sees are packets sent explicitly to or from the node, as well as some broadcast traffic. This greatly reduces the risk of eavesdropping, since it may not be practical to encrypt all communications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

IDS

A

Systems used to detect anomalous activities on the network, sending alerts to appropriate personnel when these alerts occur.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Type os IDS

A
  • Network based IDS - Usually takes the form of network appliances
  • Host based IDS - Software agent installed on each host and a separate managemnet console
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Snort

A

An Open source IDS, a software istalled on a server to monitor incoming tarffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Snort modes

A
  • Sniffer
  • Packet logger
  • Network intrusion detection
17
Q

IPS

A

These systems, like IDSs, detect anomalies on the network. However, IPSs are also able to block (internally and externally) malicious traffic

18
Q

Drawback with IPs

A

A false positive can result in legitimate traffic being blocked.

19
Q

Website filtering

A

Design to block users’access to categories of website. It limits employees’ access to non business related webiste, and also it block access to known vulnerable websites

20
Q

Data leakage prevention

A

These systems are designed to detect the transmission of potentially sensitive information into or out of an organization’s network.

21
Q

Application Whitelisting

A

They examine each executable that is launched; if the executable matches an entry in the tool’s whitelist, it is permitted to run. Otherwise, its execution is blocked.

22
Q

Netwflow

A

Netflow systems are typically used to troubleshoot network issues (because they can reveal every packet transmitted on the network), but they are handy for security purposes as well, because they can show anomalous network traffic that could be a sign of an intrusion, malware, or data exfiltration.

23
Q

What is a client-server application

A

A piece of software that runs on a client computer and makes a request to a remote server

24
Q

Security countermeasure to threats and vulnerability in client-server environments.

A
  • Access controls
  • Encryption of communication between client-server
  • Change management protocol
  • Disruption of client software update - Use countermeasure such as synchronization of client-server with server software.
  • Stealing of data - use countermeasure such the blocking the use of external storage devices