Network Security Flashcards
Man in the middle attacks, the act of disguising a communication or identity so that it appears to be associated with a trusted, authorized source.
Spoofing
Type of cyber attack carried out over a LAN that involves sending malicious ARP packets to a default gateway on a LAN in order to change the pairings in its IP addresses into MAC addresses.
ARP poisoning
3 Types of Denial of service attacks, the first will send ICMP packets that is too large and causes the system to crash, (one large packet from same source)second, Overwhelms computer with a large amount of ICMP echo requests packets. (Many packets from same source), third, Attacks from more than 1 computer. Tricks broadcast address to send ICMP packets from every other computer it has under its control for example other companies on the same network all sending ICMP packets to one computer. third, make request from spoofed IP address of the targeted device to one or more computer networks, the computer networks respond to the targeted server and potentially attempts to flood a targeted server with Internet Control Message Protocol packets.
Ping of Death- 1 large packet from the same source.
Ping Flood- Multiple ICMP echo requests.
Smurf attack- spoofs IP address of target and sends out echo requests to overwhelm targeted computer
Targets the SSL handshake protocol either by sending worthless data to the SSL server which will result in connection issues for legitimate users. This will overwhelm CPU
SSL attack
3 triad of security
Confidentiality- Assurance of data privacy and protection of data against unauthorized disclosure.
Availability- Ensuring data and services are available to authorized users when needed.
Integrity- Protecting data from unauthorized modification.