Chapter 33 - Security Architectures Flashcards

1
Q

Define Vulnerability

A

Anything that can be considered a weakness that can compromise the security of a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Define Exploit

A

Anything that can be used to take advantage of a known Vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Define Threat

A

Occurs when someone intends to exploit a vulnerability for malicious intent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Define Mitigation Technique

A

Something used to prevent or counteract threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a Spoofing Attack?

A
  • An attack in which someone replaces the source IP address/MAC address of a Packet/Frame with a fake one.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a DOS attack?

A
  • Denial of Service
  • When an attacker is able to deplete a system of resources so much so that it is unable to provide services to legitimate users and potentially crashes.
  • Can be a flood of UDP packets, TCP connections, or ICMP echo requests
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the difference between DOS and DDoS?

A
  • A DoS attack generally only comes from a single device
  • A DDoS (Distributed Denial of Service) attack will be Distributed to come from many devices that are all controlled by a central device. Known as a botnet.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What different forms of attacks can be caused by address spoofing?

A
  • DOS attacks
  • Reflection attacks
  • Amplification attacks
  • Man-In-The-Middle attacks
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is an example of a DOS attack?

A
  • The attacker can send TCP SYN segments from a fake address to a server that will respond with a SYN-ACK.
  • The connection will not be completed as the fake address will not receive the reply.
  • The server will then keep the connection in its connection table until it times out but in the meantime many more of these connections can be started, causing the server’s connection table to become congested.
  • (Other examples could be filling up a DHCP server’s leases with fake MACs to prevent legitimate users from getting addresses or giving an ARP table false information)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a Reflection attack?

A
  • The attacker will send traffic from the spoofed address of a live host to a server of some sort (the reflector)
  • The reflector will send the response back to the victim instead of the attacker. If there are multiple reflectors involved then this can cause more issues.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is an Amplification attack?

A
  • An attacker uses a protocol/service to amplify the traffic that it is already sending via reflection to a victim to overwhelm it.
  • NTP and DNS can be utilised for amplification attacks.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a Man-In-The-Middle attack?

A
  • A form of attack in which an attacker places themself between the source and destination of traffic and can eavesdrop on and manipulate data in transit. One form of this uses ARP spoofing.
  • In order to begin this type of Man-In-The-Middle attack, the attacker will listen for ARP requests being broadcast throughout the network.
  • Once it receives a broadcast, it waits a short time (so that if the real host responds, its ARP record in all other hosts’ ARP tables will be overwritten) before it replies with a spoofed IP address (the one in the request) and its own MAC address.
  • Traffic intended for the legitimate host will then be forwarded to the false host.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a Reconnaissance Attack?

A
  • Used to learn more information about a system prior to an attack in order to potentially do more damage.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are some of the tools that can be used for Reconnaissance attacks?

A
  • nslookup - Used to find the address space of a company using an FQDN owned by that company
  • whois/dig - Used to find extra DNS information about domain owners, contact information, mail servers, authoritative name servers, etc.
  • Ping Sweeps - Used to ping all addresses in a targeted range to find out which hosts respond
  • Port Scanning - Used to sweep a range of UDP and TCP ports to see if a host answers
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are Buffer Overflow attacks?

A
  • When an attacker purposefully sends data that is too large for the receiver’s buffer size and, if there is such a vulnerability, can cause data to overflow into other areas of memory. This can cause the system to run slow and potentially crash.
  • Malicious code could also be stored inside this overflowed area and the receiver could accidentally run it.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is Malware?

A
  • Malicious Software
  • A type of Malware is a Trojan Horse which is manually implanted inside of software that looks legitimate
  • Another type is a Virus which can spread easier by injecting itsself into an application which users may then transmit infecting other receivers
  • Another type is a Worm which is able to spread itsself by replicating itsself and exploiting vulnerabilities on other systems to move between them and replicate further. These can congest the network and could also contain harmful payloads.
17
Q

Examples of Human Vulnerabilities

A
  • Social Engineering
  • Phishing
  • Spear Phishing
  • Whaling
  • Pharming
  • Watering Hole Attack
18
Q

What is Social Engineering?

A
  • When an attacker poses as a legitimate user in order to manipulate someone to give them access to something or provide information that they shouldn’t
19
Q

What is Phishing?

A
  • When attackers lure users onto malicious websites using an invite sent via email that could look convincing, threatening, etc.
  • Can be used to steal information
20
Q

What is the difference between Spear Fishing and Whaling?

A
  • Spear Phishing is a form of Phishing that is generally used to exploit a group of users with similar affiliations (e.g. users that work for the same company).
  • Whaling is a form of Phishing that generally targets high profile users such as important government figures
21
Q

What is Vishing and Smishing?

A
  • Vishing - Phishing done over voice calls
  • Smishing - Phishing done over SMS
22
Q

What is Pharming?

A
  • Similar to Phishing except the attacker uses a more direct approach. This approach is to compromise the services that normally direct users towards legitimate resources such as DNS.
  • The way this is done via DNS is to edit the IP that a URL resolves to in order to direct the user to a malicious site.
23
Q

What is a Watering Hole attack?

A
  • An attacker will determine what users frequently visit a site and deposit malware there to comrpomise them
24
Q

What is the difference between an Online password hack and an Offline password hack?

A
  • Online - A hacker will attempt to guess a user’s password when prompted by the system
  • Offline - A hacker will retrieve an encrypted password and then attempt to decode the password using other software
25
Q

What is a Dictionary Password attack?

A
  • An attacker will use software to run through a given word list in order to discover a user’s password
26
Q

What is a Brute Force Password attack?

A
  • An attacker will use software to run through every different combination of letters, numbers, and symbols in order to break into a system
  • Very time and resource intensive
27
Q

Alternatives to passwords

A
  • MFA
  • Digital certificate with proof of authentication
  • Biometrics (face or fingerprint ID)
28
Q

Mitigations for password attacks

A
  • Policies put in place to ensure that passwords are a specific length and/or have a specific amount of numbers, letters, and symbols
  • Policies that require passwords to be changed at regular intervals. This can stop brute force attacks from being possible
29
Q

What is AAA?

A
  • Authentication, Authorisation, and Accounting
    - Authentication - Who is the user
    - Authorisation - What is the user allowed to do
    - Accounting - What did the user do
  • Cisco uses ISE (Identity Services Engine) as its AAA platform
  • AAA servers are normally centralised so that any changes made can be updated across all systems at once
30
Q

What are the two protocols that AAA servers can use?

A
  • TACACS+
    - Cisco proprietary
    - Terminal Access Controller Access-Control System
    - Separates each AAA function
    - Communication is secured and encrypted over TCP port 49
  • RADIUS
    - Widely used standard
    - Remote Authentication Dial In User Service
    - Combines Authentication and Authorisation into a single resource
    - Uses UDP port 1812 (authentication) and 1813 (accountng) but is not completely encrypted
31
Q

What aspects should a good Security Program aim to teach?

A
  • User awareness - Users should be made aware of confidentiality, their own user details, potential threats, and guidelines that needs to be followed in order to maintain security
  • User training - All users should be required to participate in periodic security training to reinforce security practices.
  • Physical access control - Infrastructure locations should remain securely locked and only allowed access to particular users.
32
Q

What are the fundamental goals of security?

A
  • Based on the CIA Triad
  • Confidentiality - Only authorised Users should be able to access data
  • Integrity - Data should be correct and authentic, and not modified by unauthorised users
  • Availability - The network/systems should be operational and accessible to authorised users
33
Q

What is an example of a Spoofing Attack?

A
  • DHCP Exhaustion (also an example of a DOS attack)
  • An attacker sends DHCP Discover from fake MAC addresses
  • The server responds and provides addresses to all of these with DHCP Offers.
  • The DHCP leases table is filled up with false entries so that no one else can receive an address.
34
Q

What is Tailgating?

A
  • When people simply walk behind users that have authorisation to enter an area that they don’t have authorisation for
35
Q

What is the benefit of MFA and biometrics?

A
  • MFA uses:
    - Something you know (e.g. a password, pin, etc.)
    - Something you have (e.g. a notification on a phone app)
  • Biometrics use:
    - Something you are (e.g. your face)
36
Q

What command do you use to enable aaa for login to a switch/router?

A
  • ‘aaa new-model’ from global config
  • Must be configured in order to configure aaa accounting