Internet Security Flashcards

1
Q

What is an internet protocol?

A

= set of rules that governs the communication and exchange of data over the internet
- both sender/receiver should be following the same protocol to be able to communicate
- usually not secure by default

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the usual Internet traffic path from your computer to Webserver?

A
  • you
  • modem
  • Internet Service Provider (ISP)
  • Internet Exchange Points (IXP)
  • Webserver
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Where in the traffic path is the VPN placed? What exactly does it do?

A
  • right before Webserver
  • you encrypt data locally and only decrypt it at VPN provider => others cannot see your data (only VPN)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the role of secure protocols and standards? (3)

A
  • Interoperability - diff systems can communicate
  • Baseline security - standards establish min level of security
  • Regulatory Compliance - prot/standards are incorporated in legal/regulatory framework => ensures that orgs actually implement security
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Name the internet security protocols? what do they do?

A
  • SSL (Secure Sockets Layer)
  • TLS (Transport Layer Security)
  • gives S to HTTPS
  • encrypt, secure, authenticate by adding security to transport layer
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Compare HTTP and HTTPS

A

HTTP : no id verification
HTTPS: verifies that ip address belongs to domain

HTTP: all data sent in plain-text
HTTPS: sets up end-to-end encryption between client and server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is DNS poisoning?

A
  • DNS uses a recursive resolver to contact root/TLD/Authoritative nameservers to get Domain Name
  • Malicious party sends their own malicious IP to rr
  • rr sends bad ip to client
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How does DNSSEC work?

A
  • uses public key cryptography
  • Each DNS zone has a public-private key pair
  • The private key is used to sign DNS data
  • creates chain of trust to a root server
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the cons of DNSSEC?

A
  • since more material is included in DNS response => response > request => open to amplification attacks
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the 3 common protocols for email traffic?

A
  • POP - oneway, downloads emails from server
  • IMAP - two-way, synchs emails between client-server
  • SMTP - responsible for transfer of emails between clients and servers

-usually unsecure, secured by adding SSL/TLS on top (BUT!! encrypts between servers, not you and recipient)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Describe Email Spoofing

A
  • SMTP allows users to send email with any source address
  • bad guy can send spam from any email address
  • bad guy can impersonate someone
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the Sender Policy Framework?

A
  • SPF allows domain owners to specify which servers (IP addresses) are allowed to send mail using the domain
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is DomainKey Identified Mail?

A
  • SPF validates sender, not content
  • DKIM signs email on domain-level and distribute key via DNS
  • if email is modified in transit, we can find out
How well did you know this?
1
Not at all
2
3
4
5
Perfectly