Lecture 2 Flashcards

1
Q

Open Design

A

Security should not rely on secrecy; source code can be public without reducing security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Least Privilege

A

Grant only the permissions necessary to perform tasks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

OSI Model

A

A 7-layer model for network communication that serves as a reference.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

TCP/IP Model

A

A 4-layer model for internet communication, emphasizing practical implementation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Ethernet

A

A common data link protocol, vulnerable to eavesdropping and spoofing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Packet Encapsulation

A

The process of embedding one protocol’s packet into another.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

ARP Spoofing

A

A technique where an attacker sends fake ARP messages to associate their MAC address with another IP address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

IP Spoofing

A

The creation of IP packets with a false source IP address to masquerade as another entity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

TearDrop Attack

A

An attack exploiting packet fragmentation to crash systems by overlapping fragments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Man-in-the-Middle Attack

A

An attacker intercepts and possibly alters communication between two parties.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Fraggle Attack

A

An attack that uses spoofed UDP packets to amplify traffic and overwhelm a target.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

UDP Ping-Pong

A

A packet storm caused by two hosts endlessly replying to each other’s spoofed packets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Port 80

A

The default port for HTTP traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Port 443

A

The default port for HTTPS traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

UDP

A

A connectionless protocol, used for fast but unreliable transmissions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

TCP

A

A reliable, connection-oriented protocol ensuring packet delivery.

17
Q

IPv4 Address

A

A 32-bit address used to identify devices on a network.

18
Q

IPv6 Address

A

A 128-bit address designed to replace IPv4, offering a larger address space.

19
Q

Checksum

A

A value used for error detection in network packets.

20
Q

Separation of Privilege

A

Access to resources should require multiple conditions to be met.