network security Flashcards

1
Q

what is network security

A

an activity designed to protect the usability and integrity of your network and data
can be hardware or software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what are some network types

A

lan: local area network
pan: private area network
wlan: wireless lan
can: campus area network
man: metropolitan area network
wan: wide area network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

lan

A

allows users to connect within a short distance in a common area

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

pan

A

small scale network revolving around one person or a device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

can

A

networks used in educational environments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

man

A

medium sized networks larger than a can

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

wan

A

large network with far reaching connectivity used by large corporations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

what are some examples of things that a hacker could do

A

intercept or modify data in transit
block selected or all traffic
run a program at a remote host
insert or delay previous communications
gain unauthorised access to or modify data or programs in a remote host

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what are the 2 network models

A

osi; open systems interconnection
tcp/ip

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

what are the 7 layers in the osi model

A

application
process/ presentation
session
transport
network
data link
physical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

what are the 4 layers in the tcp/ip model

A

application
transport
network
network access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

what does the iso model do

A

provides a universal language for computer networking allowing different technologies communicate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

application layer (iso model)

A

the type of app and its protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

presentation layer (iso model)

A

the syntax of the data to send and receive packets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

session layer (iso model)

A

network coordination between apps in a session

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

what is the role of a session

A

managing the beginning and end of a one-to-one app connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

transport layer (iso model)

A

ensures packets arrive in the correct order and without losses and errors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

when should we use tcp and what is an example

A

when all the data must be intact
e.g. file sharing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

when should we use udp and what is an example

A

when retaining all packets is not critical
e.g. video streaming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

network layer (iso model)

A

routing, forwarding, addressing and providing common protocols of communication across the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

data link layer (iso model)

A

technologies used to connect machines across a network and managing data frames

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

which layer in the iso model is seen as the weakest link and why

A

data link layer: no encryption or authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

physical layer (iso model)

A

physical communications mediums and tech used to transmit across it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

what are some examples of physical communications mediums

A

fibre optic cable
copper cables
air (wireless)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
why do we use tcp/ip
as its a less complicated version of the iso model
26
network access layer (tcp/ip model)
a collection of applications that require network communication generates data and establishes physical connections
27
network layer (tcp/ip model)
defines protocols responsible for data transmission across the network
28
which protocols are used in the network layer (tcp/ip model)
ip icmp arp
29
ip: internet protocol
delivers packets between the source and destination via the ip address in headers
30
icmp: internet control message protocol
encapsulated in ip datagrams and gives hosts information about network problems
31
arp: address resolution protocol
finds the hardware address from a known ip
32
transport layer (tcp/ip model)
exchanged acknowledgements and retransmits missing packets
33
which protocols are used in the transport layer (tcp/ip model)
udp tcp
34
how is udp connectionless
messages are sent without negotiating/establishing a connection it also doesnt keep track of what its sent
35
how is tcp connection based
must establish a connection before sending data
36
what does tcp use to establish a connection and how does it work
three way handshake 1. the client sends a segment with the syn(synchronize sequence number) 2. the server responds with an syn-ack signal 3. the client sends an ack again and the reliable connection is established
37
application layer (tcp/ip model)
end-to-end communication and error free delivery contains the osi app process and application layers
38
which protocols are used in the application layer (tcp/ip model)
http(s) ssh:
39
http
used by the www to manage communication between browsers and servers
40
what is the difference between http and https
secure uses http and ssl(secure socket layer)
41
ssh: secure shell
terminal emulation software that sets up a secure session over tcp/ip
42
what are some common network attacks
ip spoofing arp spoofing network sniffing tcp sequence number prediction dos ddos
43
what is the difference between dos and ddos and what makes ddos worse
ddos used multiple machines/ a botnet to flood the target harder to stop the attack by blocking a source
44
tcp sequence number prediction
if the correct sequence number is guessed they can now counterfeit packets
45
network sniffing
monitoring data transmission on a network usually the attacker preparing to enter the network
46
arp spoofing
sending falsifies arp messages over a lan the lan devices update their arp cache with the attacker mac instead of the real one traffic meant for the device on the lan is now being sent to the attacker
47
ip spoofing
attacks the network layer via manipulating datagrams and pretending to be a different ip can be done via packet generators
48
what are some common security threats
pranks ransome-ware spyware trojans backdoors/ root-kits
49
pranks
web site defacement fake news
50
spy ware
apps installed to monitor communication
51
backdoors
establishing a connection to a system in a secret way and maintaining control
52
what are some common delivery methods of threats
viruses worms phishing sql injections cross side scripting
53
what are 2 examples of software vulnerability
sql injections cross side scripting
54
sql injections
attacks data driven apps via inserting malicious sql statements into an entry field for execution
55
cross side scripting
inject client side scripts into web pages viewed by other users
56
viruses
replicate themselves by modifying other programs and inserting its own code
57
worms
replicates itself in order to spread to other computers over a network
58
what are advanced persistent threats and what does each part of its name mean
the intruder establishes an undetected presence in a network advances: can operate in the full spectrum of the computer intrusion persistent: wont give up as its formally tasked with accomplishing the mission will analyse and may propose another method treat: not a mindless piece of code, usually a group behind it that is funded and motivated
59
what are some common characteristics of phishing emails
urgent demand attractive or interesting content (free gift, promotion) disguising as a legitimate entitiy (e.g. bank) asking for personal information contains deceitful url or attachments asks to communicate in other channels to bypass security measures
60
what are a few ways of handling suspicious emails
check sender address, should be legit dont open url unless youre sure its safe dont provide personal/ financial info dont trust offers that are too goof or unrealistic demands