chapter 4 Flashcards
SCP?
SCP= Secure Copy: securely transferring files between hosts uses SSH technology.
FTP?
FTP= File Transfer Protocol: transfer a file between hosts over a network but all text is shown in plain text over network and is not secure.
what is a Network drive?
a HDD/ storage on another computer. depends on permissions but some can only ready, write ,etc.
command used to map a remote systems drive is?
net use
the command to display a list of the system’s network shares?
Net view
CIA?
Confidentiality, Authenticity and Integrety
what are the 4 goals to secure a network design?
- Availability: DOS attacks used, 2. Confidentiality: protecting network design, 3. Functionality: altering how packets are sent/ processed by network devices, 4. Access Control: control of access to systems.
Fingerprinting a network?
identify devices within a network based on network traffic information such as port numbers, TTL values, etc. can be passively monitored.
what are the 4 goals to secure a network design?
availability, confidentiality, functionality, Access Control
death of the perimeter?
the idea that creating a 100 percent secure network is impossible
flooding?
DOS attack where tons o website connection requests are made with the intent of using up the servers ram/ cpu till it crashes.
spoofing?
attacker hides own ip address by using a fake one but as a result can not receive replies and must monitor progress of attack by sending separate connection requests from a legitimate ip address and seeing if they are able to still connect.
Backscatter?
when a victim sends a series of replies to the spoofed IP address and the spoofed address happens to be an unintended user/device. the unintended device then is overwhelmed and losses service.
TCP?
transmission control protocol: guarantees delivery of IP packets over the internet.
SYN?
Synchronization: 1st part of a 3 way TCP handshake for a network connection