handout2 Flashcards

1
Q

Mirai

A

malware that infects smart devices and turn them into remotely controlled bots, it is known as botnets and used to launch DDOS attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Stuxnet

A

Computer worm originally aimed at Iran nuclear facilities, it targeted PLCs (Programmable logic controllers ) and it was capable of crippling hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is internet

A

Networks of networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Network

A

Collection of interconnected devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Securing the network infrastructure is having

A

CIA
1- Confidentiality
2- Integrity
3- Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Security

A

State of well being of information and infrastructure in which the possibility of successful yet undetected theft, distortion, or tampering of information is kept low or tolerable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Information Security

A

Operations that protect information and information systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Five layers that we must protect

A
First layer (physical)
Second layer (link)
Third layer (network)
Fourth layer (Transport)
Fifth layer (application)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The layers are from botttom to top

A

PLNTA

physical > Link >Network > Transport > application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Asset

A

Resource that we need to protect

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Threat

A

Potential violation of security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Vulnerabilitty

A

Weakness in the security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Risk

A

Potential damage or misuse of an asset

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Attack

A

action that violates security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Authenticity/Authentication

A

Sender/receiver wants to confirm identity of each other

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Authorization

A

Confirming what a user or entity is allowed to do

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Confidentiality

A

Concealment of information or resources

Only sender and intended receiver should understand message content

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Integrity

A

preventing unauthorized changes-trustworthiness of data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Non repudiation

A

When a message is received, the receiver can prove that the sender sent the message

When a message is sent , the sender can prove that the receiver received the message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Access control

A

Refers to what entities can use specific information or resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Availability

A

Services must be available to entities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Interception

A

Unauthorized access to information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Fabrication

A

Unauthorized assumption of others identity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Availability attacks

A

Destroy hardware or software

or Modify software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Passive attacks

A

Learn or make use of information of the system without affecting system resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Active attacks

A

Attempts to alter system resources or affect their operation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Example attacks on the internet ISP

A
Propagating false routing entries
Domain name hijacking
link flooding
configuration change
Packet interception
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Example Attacks On corporation/ Campus networks

A

 Unauthorized access to hosts (client, server)
 Disclosure and modification of network data
 Denial-of-service (DoS) attacks
 Distributed DoS (DDoS) attacks

29
Q

Example Attacks On application layer

A

Viruses, mail bombs, email attachments

30
Q

Network

A

Network is secure as it single weakest layer

31
Q

Internet protocol stack is made up from

A

Physical, Link , network, transport, application

32
Q

Phyiscal Layer

A

The bits on the wire or in the air

33
Q

Link Layer

A

data transfer between neighboring network elements (PPP, Ethernet)

34
Q

Network Layer

A

Routing of datagrams from source to destination like IP , routing protocols

35
Q

Transport layer

A

process-process data transfer like TCP, UDP

36
Q

Application Layer

A

Supporting network apps like FTP, SMTP, HTTP

37
Q

Missing layers in internet protocol Stack

A

Presentation and Session

They are embedded in application

38
Q

Encapsulation

A

https://www.youtube.com/watch?v=Vk_KQ6fwSxc

39
Q

Application layer like email

A

They are software programs, and they run on different end systems (Windows, MAC, Linux..)
Application layer protocol: HTTP, FTP, SMTP, DNS, RTP, SNMP, etc…

40
Q

Transport layer

A

Provide logical communication between app processes running on different hosts ( process to process communication)
Transport protocols run on end systems
Each end system has abstract destination points called ports
To communicate with a process , sender needs IP address and port number

41
Q

TCP

A

reliable in order delivery

42
Q

UDP

A
Unreliable unordered delivery
"best-effort" IP
Best effort service
Usually used for data streaming
Loss tolerant
43
Q

TCP: Transport control Protocol

A

Point to point
One sender, one receiver,
Reliable in order byte system
Full duplex (Bi directional data flow in same connection)

44
Q

Internetworking

A

provides the ability to communicate between many different networks
In internetworking we have: Network, Routers, Internet Protocol

45
Q

Network layer

A

> Transport segment from sending to receiving host
Sender; encapsulates segments into datagrams
Receiver: deliver segment to transport layer

46
Q

Routers examine header fields in all IP datagrams passing through them

A

True

47
Q

In routers we have

A

> Interconnection of different networks
Encapsulation of network layer datagrams in MAC layer frames
Fragmentaion if datagram is too large
Forwarding of packets from routers input to appropriate router output
Routing : determine route taken by packet from source to destination

48
Q

IP address

A

> 32 bits

> Identify host and router interfaces

49
Q

Routing algorithms

A

> Global : Algorithm has complete knowledge about the network
Decentralized: Router knows physically connected neighbors

50
Q

Data link layer

A

Responsibility of transferring datagram from one node to adjacent node over a link

51
Q

Data link services : Framing

A

Encapsulating datagram into frame adding header and trailer

52
Q

Data link services: Error detection/ correction

A

Receiver detects presence of errors

53
Q

Data link Reliable transmission

A

Mechanisms for retransmission of frame

54
Q

Multiple access protocols

A
Two different network scenarios:
1- Point to Point (PPP) for dial up access
2- Multiple access:
Ethernet 
Token rings, FDDI
55
Q

MAC addresses

A

Used to get frame from one interface to another
48 bits burnt in the adapter ROM
Each adapter has unique MAC address

56
Q

Nodes connect to hub or switches

A

True

57
Q

Hubs

A

LAN repeaters

58
Q

What are switches

A

Switches are link layer devices

59
Q

What switches do

A

> store and forward Ethernet frames
Examine frame header and selectively forward frame based on MAC addresses
When frame is forwarded , check if channel is free to transmit

60
Q

Hosts are unaware of presence of switches *switches are transparent)

A

True

61
Q

Switches do not need to be configured

A

True

62
Q

Switch filter packets

A

Same LAN segment do not usually forwarded onto other LAN segments

63
Q

Vulnerabilities - Physical Access

A

Physical access : If a computer can be physically accessed , control can be gained straight forward
countermeasure: computers must be kept in a physically secure environment

64
Q

Vulnerabilities - software flaws

A

> Can occur in OS or application programs

65
Q

Buffer overflaw is the most common software flaw

A

true

66
Q

Vulnerabilities - Insecure OSs

A

Windows 3.x doesnot provide any security

Countermeasure: Use as a closed system

67
Q

Vulnerabilities poor configuration

A

like passwordless accounts

Wrong permisssions on files and directories

68
Q

REached 67

A

true