CSCI 427 Exam 1 Flashcards
What are the three principles that form the Security Triad?
confidentiality, integrity, availability
What is confidentiality mean in the context of security?
data is only available to authorized users
What does integrity mean in the context of security?
the data has not been altered between the person who originated it and the receiver
What does availability mean in the context of security?
data and systems being available when needed without interruption
What is the difference between authentication and authorization?
authentication: procedures to identify users are who they claim to be (the account itself)
authorization: permissions to control user access to data (permissions assigned to that particular account)
? is the ability of a system to track the actions of users.
accountability
When implemented correctly, ? provides nonrepudiation
accountability
Pentesters should always have ? before starting a pentest
permission/contract
List three questions pentesters should always ask clients prior to performing a penetration test
(1) Why do they want/need a pentest? (2) What are the rules of engagement? (3) What are the client’s expectations at the end of the test?
Who was John Nevil Maskelyne, and why is he noteworthy in the context of hacking?
credited for the first known form of electronic “hacking” – disrupting a wireless telegraph (hacked the radio signal to prove insecure by turning the dial to the right frequency and overpowering the signal)
Section 1030 of the Computer Fraud and Abuse Act defines a “protected computer” as any computer taking part in interstate and/or foreign commerce and/or communication. Why is this definition considered broad and applicable to almost any computer?
It sweeps up every modern computer because all are used for email, online shopping, etc.
What is a Layer 2 (Ethernet) device that is outmoded and should never be used?
hubs
How does a switch differ from a hub?
only send signals to their intended recipients (hubs forward signals to all connected devices)
What is a Layer 3 (Network) device that connects networks?
router
? is a critical network device that restricts traffic between networks and typically sits between a router and the Internet
firewall
? are placed close to network choke points and monitor for malicious network traffic
Intrusion Detection Systems (IDS)
List the 7 layers of the OSI Model
(in order 7 to 1): Application, Presentation, Session, Transport, Network, Data Link, Physical
TCP takes place at which OSI layer?
transport (L4)
Ethernet takes place at which OSI layer?
data link (L2)
List the steps of the TCP three-way handshake
- client sends a SYN data packet to a server to see if the server is open for new connections
- the server responds and returns a SYN/ACK packet to confirm
- the client receives the SYN/ACK from the server and responds with an ACK packet
- the connection is created and the client and server can now communicate
Which header includes IP addresses?
IP header format
Which header can include SYN flags?
TCP segment header
Which header includes MAC addresses?
Ethernet segment header
List 3 common network device vulnerabilities.
enabled telnet, default passwords, out of date firmware
SYN flag
initiates a connection between two hosts
ACK flag
acknowledges the receipt of a SYN and data packets after a connection is established
FIN flag
tells the remote system that no more data will be sent, gracefully closing a connection
Encryption primarily accomplishes ? in the Security Triad.
confidentiality
Digital signatures provide nonrepudiation because
only the public key can decrypt anything that’s been encrypted with the private key; cryptography allows authentication to positively identify data as coming from its creator
Nonrepudiation is
positive, undeniable evidence of a source
A cipher is
the algorithm used for encrypting plain text into cipher text (encryption algorithm)