handout2 Flashcards

1
Q

Mirai

A

malware that infects smart devices and turn them into remotely controlled bots, it is known as botnets and used to launch DDOS attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Stuxnet

A

Computer worm originally aimed at Iran nuclear facilities, it targeted PLCs (Programmable logic controllers ) and it was capable of crippling hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is internet

A

Networks of networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Network

A

Collection of interconnected devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Securing the network infrastructure is having

A

CIA
1- Confidentiality
2- Integrity
3- Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Security

A

State of well being of information and infrastructure in which the possibility of successful yet undetected theft, distortion, or tampering of information is kept low or tolerable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Information Security

A

Operations that protect information and information systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Five layers that we must protect

A
First layer (physical)
Second layer (link)
Third layer (network)
Fourth layer (Transport)
Fifth layer (application)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The layers are from botttom to top

A

PLNTA

physical > Link >Network > Transport > application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Asset

A

Resource that we need to protect

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Threat

A

Potential violation of security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Vulnerabilitty

A

Weakness in the security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Risk

A

Potential damage or misuse of an asset

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Attack

A

action that violates security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Authenticity/Authentication

A

Sender/receiver wants to confirm identity of each other

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Authorization

A

Confirming what a user or entity is allowed to do

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Confidentiality

A

Concealment of information or resources

Only sender and intended receiver should understand message content

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Integrity

A

preventing unauthorized changes-trustworthiness of data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Non repudiation

A

When a message is received, the receiver can prove that the sender sent the message

When a message is sent , the sender can prove that the receiver received the message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Access control

A

Refers to what entities can use specific information or resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Availability

A

Services must be available to entities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Interception

A

Unauthorized access to information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Fabrication

A

Unauthorized assumption of others identity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Availability attacks

A

Destroy hardware or software

or Modify software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Passive attacks
Learn or make use of information of the system without affecting system resources
26
Active attacks
Attempts to alter system resources or affect their operation
27
Example attacks on the internet ISP
``` Propagating false routing entries Domain name hijacking link flooding configuration change Packet interception ```
28
Example Attacks On corporation/ Campus networks
 Unauthorized access to hosts (client, server)  Disclosure and modification of network data  Denial-of-service (DoS) attacks  Distributed DoS (DDoS) attacks
29
Example Attacks On application layer
Viruses, mail bombs, email attachments
30
Network
Network is secure as it single weakest layer
31
Internet protocol stack is made up from
Physical, Link , network, transport, application
32
Phyiscal Layer
The bits on the wire or in the air
33
Link Layer
data transfer between neighboring network elements (PPP, Ethernet)
34
Network Layer
Routing of datagrams from source to destination like IP , routing protocols
35
Transport layer
process-process data transfer like TCP, UDP
36
Application Layer
Supporting network apps like FTP, SMTP, HTTP
37
Missing layers in internet protocol Stack
Presentation and Session | They are embedded in application
38
Encapsulation
https://www.youtube.com/watch?v=Vk_KQ6fwSxc
39
Application layer like email
They are software programs, and they run on different end systems (Windows, MAC, Linux..) Application layer protocol: HTTP, FTP, SMTP, DNS, RTP, SNMP, etc...
40
Transport layer
Provide logical communication between app processes running on different hosts ( process to process communication) Transport protocols run on end systems Each end system has abstract destination points called ports To communicate with a process , sender needs IP address and port number
41
TCP
reliable in order delivery
42
UDP
``` Unreliable unordered delivery "best-effort" IP Best effort service Usually used for data streaming Loss tolerant ```
43
TCP: Transport control Protocol
Point to point One sender, one receiver, Reliable in order byte system Full duplex (Bi directional data flow in same connection)
44
Internetworking
provides the ability to communicate between many different networks In internetworking we have: Network, Routers, Internet Protocol
45
Network layer
> Transport segment from sending to receiving host > Sender; encapsulates segments into datagrams > Receiver: deliver segment to transport layer
46
Routers examine header fields in all IP datagrams passing through them
True
47
In routers we have
>Interconnection of different networks >Encapsulation of network layer datagrams in MAC layer frames >Fragmentaion if datagram is too large > Forwarding of packets from routers input to appropriate router output > Routing : determine route taken by packet from source to destination
48
IP address
> 32 bits | > Identify host and router interfaces
49
Routing algorithms
> Global : Algorithm has complete knowledge about the network > Decentralized: Router knows physically connected neighbors
50
Data link layer
Responsibility of transferring datagram from one node to adjacent node over a link
51
Data link services : Framing
Encapsulating datagram into frame adding header and trailer
52
Data link services: Error detection/ correction
Receiver detects presence of errors
53
Data link Reliable transmission
Mechanisms for retransmission of frame
54
Multiple access protocols
``` Two different network scenarios: 1- Point to Point (PPP) for dial up access 2- Multiple access: Ethernet Token rings, FDDI ```
55
MAC addresses
Used to get frame from one interface to another 48 bits burnt in the adapter ROM Each adapter has unique MAC address
56
Nodes connect to hub or switches
True
57
Hubs
LAN repeaters
58
What are switches
Switches are link layer devices
59
What switches do
> store and forward Ethernet frames > Examine frame header and selectively forward frame based on MAC addresses >When frame is forwarded , check if channel is free to transmit
60
Hosts are unaware of presence of switches *switches are transparent)
True
61
Switches do not need to be configured
True
62
Switch filter packets
Same LAN segment do not usually forwarded onto other LAN segments
63
Vulnerabilities - Physical Access
Physical access : If a computer can be physically accessed , control can be gained straight forward countermeasure: computers must be kept in a physically secure environment
64
Vulnerabilities - software flaws
> Can occur in OS or application programs
65
Buffer overflaw is the most common software flaw
true
66
Vulnerabilities - Insecure OSs
Windows 3.x doesnot provide any security | Countermeasure: Use as a closed system
67
Vulnerabilities poor configuration
like passwordless accounts | Wrong permisssions on files and directories
68
REached 67
true