Network Security terms Flashcards

1
Q

CIA

A
  • Confidentiality
  • Integrity
  • Availability
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Confidentiality

A

▪ Keeping the data private and safe

• Encryption • Authentication to access resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Symmetric Encryption

A

▪ Both sender and receiver use the same key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

DES

A

Data Encryption Standard

  • Developed in the mid-1970s
  • 56-bit key
  • Used by SNMPv3
  • Considered weak today
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

3DES

A

(Triple DES)

  • Uses three 56-bit keys (168-bit total)
  • Encrypt, decrypt, encrypt
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

AES

A

(Advanced Encryption Standard)

  • Preferred symmetric encryption standard
  • Used by WPA2
  • Available in 128-bit, 192-bit, and 256-bit keys
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Asymmetric Encryption

A

▪ Uses different keys for sender and receiver

▪ RSA is the most popular implementation

▪ RSA algorithm is commonly used with a public key infrastructure (PKI)

▪ PKI is used to encrypt data between your web browser and a shopping website

▪ Can be used to securely exchange emails

▪ Sender and receiver use different keys to encrypt and decrypt the messages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Integrity

A

Hashing (Integrity)

▪ Ensures data has not been modified in transit

▪ Verifies the source that traffic originates from

(MD5) 128-bit hash digest

(SHA-1) 160-bit hash digest

(SHA-256) 256-bit hash digest

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Availability

A

Measures accessibility of the data
▪ Increased by designing redundant networks
▪ Compromised by
• Crashing a router or switch by sending improperly formatted data
• Flooding a network with so much traffic that legitimate requests cannot be processed o Denial of Service (DoS) o Distributed Denial of Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Attacks on Confidentiality

A
▪ Packet capture
▪ Wiretapping  
▪ Dumpster diving 
▪ Ping sweep 
▪ Port scan 
▪ Wireless interception o
 EMI interference interception
▪ Man-in-the-Middle 
▪ Social engineering 
▪ Malware/Spyware
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Attacks on Integrity

A
Man-in-the-middle 
▪ Data diddling 
• Changes data before storage 
▪ Trust relationship exploitation  
▪ Salami attack 
• Puts together many small attacks to make one big attack 
▪ Password attack 
• Trojan Horse, Packet Capture, Keylogger, Brute Force, Dictionary Attack
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Man-in-the-Middle

A

Causes data to flow through the attacker’s computer where they can intercept or manipulate the data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Session Hijacking

A

Attacker guesses the session ID for a web session, enabling them to take over the already authorized session of the clien

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Botnets

A

▪ Software robot that lies on a compromised computer
▪ Collection of computers (called zombies) can be controlled by a remote server to perform various attacks/functions for the criminals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Attacks on Availability

A

• Denial of service (DoS) • Distributed Denial of Service (DDoS) • TCP SYN flood • Buffer overflow • ICMP attacks (Smurf) • UDP attacks (Fraggle) • Ping of Death • Electrical disturbances • Physical environment attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

TCP SYN Flood

A

Variant on a Denial of Service (DOS) attack where attacker initiates multiple TCP sessions, but never completes the 3-way handshake

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Smurf (ICMP Flood)

A

Attacker sends a ping to subnet broadcast address and devices reply to spoofed IP (the victim) using up bandwidth and processing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Electrical Disturbance

A

• Power spikes • Electrical surges • Power faults • Blackouts • Power sag • Brownout

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Insider Threats

A

Employees or other trusted insiders who use their network access to harm the company

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Logic Bomb

A

Specific type of malware that is tied to a time or logical event

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Phishing

A

Attackers send email to get a user to click link

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Ransomware

A

Attackers gain control of your files, encrypt them, and hold them for a ransom

23
Q

Deauthentication

A

▪ Attacker sends a deauthentication frame a victim to disconnect them from the network

▪ Often used in wireless hacking attacks

24
Q

VLAN Hopping

A

▪ Attacker physically connects to a different switch port to access a different VLAN

▪ Manually assigning switch ports and using NAC can help prevent this

25
Q

Patching

A

▪ Designed to correct a known bug or fix a known vulnerability in programs and apps

▪ Should be implemented as they become available

▪ Updates add new features, but patches fix known vulnerabilities

26
Q

Honey Pots and Honey Nets

A

▪ Systems designed as an attractive target

• Distraction for the attacker

▪ Attackers use their resources attacking the honey pot and leave the real servers alone

  • Honey pot is a single machine
  • Honey net is a network of multiple honey pots

▪ Used to study how attackers conduct attacks

27
Q

SHH

A

Secure remote access via terminal emulator

28
Q

RADIUS

A

Remote Authentication Dial In User Service (RADIUS)
(AAA) Framework, UDP 1812/1813

Networking protocol design to authenticate and log remote network users

29
Q

TACACS+

A

Terminal Access Controller Access-Control System + is a Cisco protocol. Uses (AAA) TCP 49

Used to administrator access to network devices - Switches, Routers, Firewall etc

30
Q

AAA

A

Authentication
-Who you are by credentials

Authorization
-What you can do
(access resources, services, task, time, etc)

Accounting
(track user activities, resources used, for how long, etc.
This can be used for billing customers in data center)

31
Q

(BYOD) vulnerabilities

A
  • Bluejacking - Sending of unauthorized messages over Bluetooth
  • Bluesnarfing - Provides unauthorized access to wireless through Bluetooth
  • Bluebugging - Unauthorized backdoor to connect Bluetooth back to attacker
32
Q

Data Loss Prevention

A

▪ Policy that seeks to minimal accidental or malicious data losses

  • Client level (data in operation)
  • Network level (data in transit)
  • Storage level (data at rest)
33
Q

Multifactor Authentication

A
▪ Something you know 
▪ Something you have 
▪ Something you are 
▪ Something you do 
▪ Somewhere you are
34
Q

Something You Have (Possession Factor)

A

▪ Smartcard
• Stores digital certificates on the card which are accessed once a valid PIN is provided (keyboard reader)
▪ Key fobs
▪ RFID tags

35
Q

Something You Are (Inherence Factor)

A

▪ Fingerprints
▪ Retina scans
▪ Voice prints

36
Q

Something You Do (Action Factor)

A

▪ How you sign your name
▪ How you draw a particular pattern
▪ How you say a certain passphrase

37
Q

Somewhere You Are (Location Factor)

A

▪ Geotagging

▪ Geofencing

38
Q

Packet-Filtering Firewalls

A

▪ Permits or denies traffic based on packet header • Source IP address/port number • Destination IP address/port number ▪ Looks at each packet individually

39
Q

Stateful Firewalls

A

▪ Inspects traffic as part of a session

▪ Recognizes whether traffic originated from inside or outside the LAN

40
Q

NextGen Firewalls (NGFW)

A

▪ Third generation firewalls that conduct deep packet inspection and packet filtering
▪ Operates at higher levels of the OSI model than traditional stateful firewalls
▪ Web Application Firewalls are a good example of these, as they inspect HTTP traffic

41
Q

Access Control List (ACL)

A

▪ Set of rules typically applied to router interfaces that permit or deny certain traffic

  • Source IP, Port, or MAC
  • Destination IP, Port, or MAC
42
Q

Unified Threat Management (UTM) Devices

A

▪ Device that combines firewall, router, intrusion detection/prevention system, antimalware, and other security features into a single device

▪ Agent is run on an internal client and can be queried by the UTM before allowing connection to the network

▪ UTM can be purchased as a physical device to install in your network, or you can look to a cloud solution

43
Q

Intrusion Detection System (IDS)

A

▪ Passive device
▪ Operates parallel to the network
▪ Monitors all traffic and sends alerts

44
Q

Intrusion Prevention System (IPS)

A

▪ Active device
▪ Operates in-line to the network
▪ Monitors all traffic, sends alerts, and drops or blocks the offending traffic

45
Q

Network-based (NIDS/NIPS)

A

Network device to protect entire network

• NIPS might prevent a DoS attack whereas a HIPS solution could focus on the protection of applications on a host from malware and other attacks

46
Q

Host-based (HIDS/HIPS)

A

• Software-based and installed on servers/clients

▪ Network and Host-based can work together for more complete protection

47
Q

Site to Site

A

Interconnects two sites and provides an inexpensive alternative to a leased line

48
Q

Client to Site

A

Connects a remote user with a site and commonly called remote access

49
Q

VPN Types: SSL

A

▪ Secure Socket Layer (SSL) provides cryptography and reliability for upper layers of the OSI model (Layers 5-7)

▪ Largely replaced by TLS in current networks
▪ Provides for secure web browsing via HTTPS

50
Q

VPN Types: TLS

A

▪ Transport Layer Security (TLS) has mostly replaced SSL

▪ If you are using an HTTPS website, you are probably using TLS

51
Q

VPN Types: DTLS

A

▪ Datagram Transport Layer Security (TLS) is used to secure UDP traffic
▪ Based on the TLS protocol
▪ Designed to give security to UDP by preventing eavesdropping, tampering, and message forgery

52
Q

VPN Types: L2TP

A

▪ Layer 2 Tunneling Protocol (L2TP) lacks security features like encryption
▪ Can be used for secure VPN if combined with additional protocols for encryption services

53
Q

VPN Types: PPTP

A

▪ Point-to-Point Tunneling Protocol (PPTP) is an older protocol that supports dial-up networks
▪ Lacks native security features, but Windows added some features in their implementation

54
Q

IP Security (IPSec)

A

▪ VPNs most commonly use IPsec to provide protections for their traffic over the internet using CIA

IPsec uses the Internet Key Exchange (IKE) to create a secure tunnel • IKE uses encryption between authenticated peers