Chapter 19: Protecting Your Network Flashcards
The three goals of security, the CIA triad, are:
- Confidentiality
- Integrity
- Availability
____ is the goal of keeping unauthorized people from accessing, seeing, reading, or interacting with systems and data.
Confidentiality
____ requires maintaining data and systems in a pristine, unaltered state when they are stored, transmitted, processed, and received, unless the alteration is intended due to normal processing.
Integrity
____ means ensuring that systems and data are available for authorized users to perform authorized tasks, whenever they need them.
Availability
____ is a cybersecurity paradigm focused on resource protection and the premise that trust is never granted implicitly but must be continually evaluated.
Zero trust
____ acknowledges that you can’t build a completely secure perimeter, so you should design your security posture with the assumption that every single defense can be beaten.
Defense in depth
____ is about identifying how people could abuse or misuse a system, determining what access they’d need to do so, and then splitting up that access so that no individual has the ability to do it alone.
Separation of duties
In ____, an attacker alters a DNS server’s cache to point clients to an evil Web server instead of the correct one.
DNS poisoning
To prevent DNS cache poisoning, the typical use case scenario is to add ____ for domain name resolutions.
DNSSEC or DNS Security Extensions
____ is a switch process that monitors DHCP traffic, filtering out DHCP messages from untrusted sources. Typically, it’s used to block attacks that use a rogue DHCP server.
DHCP snooping
In IPv6 networks, ____ enables the switch to block router advertisements and router redirect messages that are not sent from trusted ports or don’t match a policy.
RA-Guard or Router Advertisement Guard
____ attacks target ARP caches on hosts and MAC address tables on switches.
ARP cache poisoning
What tool uses the DHCP snooping binding database to prevent ARP cache poisoning?
DAI or Dynamic ARP Inspection (Cisco)
Implementing Dynamic ARP Inspection (DAI) and DHCP snooping enhances ____, a key network hardening technique.
switch port protection
A ____ attack is a targeted attack on a server (or servers) that provides some form of service on the Internet with the goal of making that service unable to process any incoming requests.
DoS or Denial of Service
Used in DDoS attacks, ____ is where the attacker sends requests to normal servers with the target’s IP address spoofed as the source. The normal servers respond to the spoofed IP address (the target system), overwhelming it with reflected traffic without identifying the true initiator.
reflection
A/An ____ DoS attack sends a small amount of traffic to a server, which produces a much larger response from the server that is sent to a spoofed IP address, overwhelming a victim machine.
amplified
A/An ____ is a form of DoS attack that targets 802.11 WiFi networks specifically by sending out a frame that kicks a wireless client off its current WAP connection. A rogue WAP nearby presents a stronger signal, which the client will prefer. The rogue WAP connects the client to the Internet and then proceeds to intercept communications to and from that client.
deauthentication (deauth) attack
A/An ____ attack is where an attacker takes advantage of DHCP scope exhaustion by spoofing packets to the DHCP server, tricking it into giving away all of its leases and therefore running out of open addresses. It is a technique used to encourage clients to switch to a rogue DHCP server that the attacker controls.
DHCP starvation
In an ____, an attacker taps into the communications between two systems, covertly intercepting traffic thought to be only between those systems, reading or in some cases even changing the data and then sending the data on.
on-path attack (aka. man-in-the-middle)
____ tries to intercept a valid computer session to get authentication information.
Session hijacking
____ is an attack where a threat agent guesses every permutation of some part of data.
Brute force