Chapter 2 Flashcards
Network Monitors
AKA Sniffers
help troubleshoot network problems. Dig much deeper than IPconfig to tell you what’s actually going on on the network.
Today consists of a PC with an NIC
Promiscuous Mode
The network card looks at the packet that it sees on the network even if it is not addressed to that file
Application Log
This log contains various events logged by applications or programs. Many applications will record their errors in the log. Provides clues that someone has been attempting to compromise the database
Security Log
Contains successful/unsuccessful logon attempts. Also records events related to resource use such as creating, opening, or deleting files/objects
Extensions used to save a log file
EVT, TXT, CSV
File/Print Server Vulnerabiliy
DoS attacks and access attacks. Target a specific port and overwhelm the the port
RPC
Remote Procedure Call
programing interface that allows a remote computer to run programs on a local machine. Contains serious vulnerabilities.
Place where common attacks to Networks with PC-Based systems
NetBIOS services: ports 135, 137, 138, and 139
To prevent make sure that NetBIOS services are disabled on servers or that an effective firewall is in place
Place to look for up to date informations on Windows operating system issues
Microsoft Safety and Security Center
Which software should you keep on your computer?
Only relevant software should be kept on the computer
If it isn’t essential, get rid of it!
Patches. What they are and when to get them (not the types)
An update to a system. Can add new functionality or fix a bug in the software. In a business test them first to make sure they won’t mess everything up. In personal use let them auto update.
Also what a pirate wears over his/her eye.
Three types of patches
- Service Pack - corrects problems within a version of the product
- Updates - code fixes for products that are provided in the event of critical problems
- Security Updates - Mandatory updates to make sure that known security problems are fixed
UAC best practices
User Account Control
Disable unnecessary accounts: they allow for a door into the system. These include former employees and guest accounts
Require passwords: you should always require passwords
what does $ denote?
Hidden administrative files. They manage a computer on a network and can only be deleted through Registry edits
Should you use MAC filtering or port authentication?
Why not both? MAC filtering can be circumvented fairly simply unless you authenticate