Introduction to Network Security Flashcards

1
Q

Define vulnerability

A

weakness in the network or its protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Define threat

A

set of circumstances that has the potential to cause harm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

define intrusion

A

an act or event that compromises the information on a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

define breach

A

a breakdown of the security of a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the 5 intrusion types? Give an example of each

A
Interruption - DoS
Interception - Eavesdropping
Modification - Man in the Middle
Fabrication - Malware
Invasion - Session Hijacking
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the levels or phases of intrusion?

A

Level 0 - no intrusion
Level 1 - Intrusion occurs, no trail
Level 2 - Intrusion occurs, no damage, trail is left
Level 3 - Files are damaged and data is altered
Level 4 - Services are disrupted
Level 5 - Valuable information is stolen espionage and felony

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is an example of an IP address finder

A

NSLOOKUP/DIG

sends queries to dns about networks and extracts the IP address blocks assigned to a particular network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is an example web server information gatherer

A

Netcraft

Web based tool that lists information such as the type and version of web server, geo location, last update

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is an example of an IP address tracer?

A

traceroute, tracert, visualroute
Tools that use ICMP packets to trace the route to a destination host. The hostname, IP address, and the round trip time to each intermediate node are listed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is an example of an IP location finder?

A

iplocation.net

Determines the geo location of an IP address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is an example of a port scanner ++

A

nmap, zenmap
Determines what hosts are available on the network what services those hosts are offering, and what OD versions they are running, what type of packet filters/firewalls are in use, etc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is an example of a port scanner?

A

Angry IP Scanner
Cross platform, lightweight, and very fast IP and port scanner; Can scan an IP address in any range or any of their ports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is an example of traffic monitoring?

A

Wireshark

Captures every frame that passes on its network, allowing analysis of the captured fram

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is an example of traffic monitoring?

A

TCPDump

Unix based network sniffer/analyzer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is an example of a wireless network information gatherer (Active sniffer)

A

Netstumbler
enables wireless network information gathering. displays MAC address of the access point, their names, channel numbers, vendors, whether security is enabled or not, and signal to noise ratio.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is an example of a wireless network information gatherer (Passive sniffer)

A

Kismet
Wireless network detector, sniffer, and intrusion detection system. Can even decloak hidden networks that have turned off SSID beaconing KisMAC is the Mac version

17
Q

What are some tools for vulnerability testing?

A
NESSUS
Nexpose
GFLIANguard Network Security Scanner
NIKTO
Nipper Studio
18
Q

What are some tools for gaining access?

A

Brute force
Password crackers
Keyloggers
Address Spoofers

19
Q

What are some tools and techniques used by hackers for launching attacks?

A
DoS
Man in the Middle Attack
Data Modification
Replay Attack
Injection of Malicious Code
20
Q

What are some “other” attack tool categories?

A
Binders and cryters
Bots
FB hacking tools
GMail hacking tools
Mail bombers
Mobile hacking tools
Virus creator
Website hacking tools
21
Q

What is the crux of secure network design?

A

Protect your network and protect your transaction

22
Q

List the 7 security goals and what they mean

A

Confidentiality - no eavesdropping
Integrity - message received = message sent
Authentication - sender validation
Non-repudiation - source must not be able to deny a transaction
Certification - third party certifies this source as good
_____the above can be achieved via cryptography

Access control - who can access what and when
Availability - system resources are always available for legitimate users
These can be achieved by Firewall