Network Security Flashcards

1
Q

What is a network Protocol?

A

A Protocol is an agreement on how to communicate Specifies the syntax, format of message, order exchanged Specifies the semantics, what they mean, specify times.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a Internet Protocol (IP)?

A
  • lets computers communicate around the world.
  • Has defined binary representation for transmission over the networks it uses.
  • Everything is big-endian (Network byte order)
  • Any IP-enabled host receiving an IP packet knows how to handle it, because of the protocol
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the 7 layers of the OSI Model?

A

7 - Application

6 - Presentation

5 - Session

4 - Transport

3 - Network

2 - Data Link’

1 - Physcial

Please do not throw sausage pizza away

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How are bits encoded for a single physical link?

A
  • Voltage levels
  • RF modulation
  • Photon wavelengths/intensities

Tech used, Coaxial, twisted pair, RF Broadcast, Fibre

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What happens in the link layer?

A
  • Combines bits into frames
  • Provides local addressing (MAC)
  • Supports point-to-point and often broadcast delivery
  • Can Transmits messages with the subnet
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a subnet?

A

A subnet is a logical partition of an IP network into multiple, smaller
network segments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What happens in the network layer?

A
  • Bridges subnets for end-to-end connectivity
  • Provides global addressing
  • Delivery is best-effort
  • Data is encapsulated in packets (packets assembly)

router is a device that implements up through Network layer (Layer 3)
⇒ connects multiple subnets
⇒ different IP addresses on each interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What happens in the transport layer?

A

End-to-end communication between processes
UDP (User DatagramProtocol)

  • UDP socket contains the port number and
  • IP address of the destination only
  • unreliable, best effort, no packet retransmission if the if it gets lost
  • datagram-based (single-packet messages)

TCP (Transmission Control Protocol)

  • TCP socket contains the port numbers and IP addresses of the source & destination
  • reliable, keeps track of data sent/received
  • retransmission of lost packets
  • byte-based (messages/sessions span possibly many packets)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What happens in the application layer?

A

What users/processes interact with
Choice of transport depends on what is needed

  • Web browsing ⇒ TCP
  • Email ⇒ TCP
  • Voice calls ⇒ UDP

Defines its own data formats and protocols, within TCP or UDP

  • Web browsing ⇒ HTTP (Hypertext Transfer Protocol)
  • Email ⇒ SMTP (Simple Mail Transfer Protocol)\
  • Voice calls ⇒ RTP (Real-time Transport Protocol)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are Network Security Threats?

A
  • ARP Poisoning
  • Sniff, Spoof,
  • DNS Poisoning
  • Denial of Service
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is MAC, Why is it vulnerable?

A
  • 48 bits = 6 bytes
  • Can be changed in some hardware,
  • Can be simulated in software
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does ARP do?

A

Address Resolution Protocol

  • Translate IP (logical) addresses to MAC (physical) addresses.
  • Each host OS has a table of IP to MAC addresses.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is ARP Poisoning?

A

Sending forged ARP replies a target system could be convinced to send frames destined for a computer to another.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What can defend against ARP Poisoning?

A
  • Static ARP table
  • Access control based on IP, MAC, and Port
  • Redirect user to a registration page before allowing usage of the network.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a sniffing attack?

A
  • Sniffers listen to packets on the network and pick out interesting details, e.g. passwords
  • Hackers install sniffer software on compromised hosts. Tools are available for download
  • Wireless Ethernet most vulnerable
  • unauthorized listening
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Is it possible for an attacker to sniff traffic at router/switch level?

A

Yes

  • tools available such as ‘dsniff’
  • directly exploit its memory limitations and make the switch act as a hub
17
Q

How can you defend against a sniffing attack?

A

Encryption - HTTPS

18
Q

What is IP Spoofing?

A

sending unauthentic messages = using false sender address or identifier

19
Q

What is happening in the image?

A

IP Spoofing

20
Q

How can you defend against IP Spoofing?

A
  • Monitoring networks for atypical activity,
  • Deploying packet filtering to detect inconsistencies
  • Authenticating all IP addresses,
  • Firewall
21
Q

What is DNS?

A

Domain Name Server

DNS servers translate web addresses (like www.howtogeek.com) into their IP addresses (like 23.92.23.113)

22
Q

How do you lookup a DNS address

A

nslookup

23
Q

What is DNS Hijacking?

A
  • Route packets to the wrong server
24
Q

What is DNSSEC?

A
  • Assignments, response.
25
Q

What is a DOS attack?

A

denial-of-service, attacks is to prevent authorized users from accessing a resource, or to reduce the quality of service that they receive.

Destruction or Disabling

Examples:
• Formatting the hard disk
• Crashing a server
• These attacks usually exploit a bug in a system implementation.
• Hence, can be prevented by proper design and implementation.

  • Flooding a web server with requests
  • Flooding a communications link with packets
26
Q
A