Network Security terms Flashcards
CIA
- Confidentiality
- Integrity
- Availability
Confidentiality
▪ Keeping the data private and safe
• Encryption • Authentication to access resources
Symmetric Encryption
▪ Both sender and receiver use the same key
DES
Data Encryption Standard
- Developed in the mid-1970s
- 56-bit key
- Used by SNMPv3
- Considered weak today
3DES
(Triple DES)
- Uses three 56-bit keys (168-bit total)
- Encrypt, decrypt, encrypt
AES
(Advanced Encryption Standard)
- Preferred symmetric encryption standard
- Used by WPA2
- Available in 128-bit, 192-bit, and 256-bit keys
Asymmetric Encryption
▪ Uses different keys for sender and receiver
▪ RSA is the most popular implementation
▪ RSA algorithm is commonly used with a public key infrastructure (PKI)
▪ PKI is used to encrypt data between your web browser and a shopping website
▪ Can be used to securely exchange emails
▪ Sender and receiver use different keys to encrypt and decrypt the messages
Integrity
Hashing (Integrity)
▪ Ensures data has not been modified in transit
▪ Verifies the source that traffic originates from
(MD5) 128-bit hash digest
(SHA-1) 160-bit hash digest
(SHA-256) 256-bit hash digest
Availability
Measures accessibility of the data
▪ Increased by designing redundant networks
▪ Compromised by
• Crashing a router or switch by sending improperly formatted data
• Flooding a network with so much traffic that legitimate requests cannot be processed o Denial of Service (DoS) o Distributed Denial of Service
Attacks on Confidentiality
▪ Packet capture ▪ Wiretapping ▪ Dumpster diving ▪ Ping sweep ▪ Port scan ▪ Wireless interception o EMI interference interception ▪ Man-in-the-Middle ▪ Social engineering ▪ Malware/Spyware
Attacks on Integrity
Man-in-the-middle ▪ Data diddling • Changes data before storage ▪ Trust relationship exploitation ▪ Salami attack • Puts together many small attacks to make one big attack ▪ Password attack • Trojan Horse, Packet Capture, Keylogger, Brute Force, Dictionary Attack
Man-in-the-Middle
Causes data to flow through the attacker’s computer where they can intercept or manipulate the data
Session Hijacking
Attacker guesses the session ID for a web session, enabling them to take over the already authorized session of the clien
Botnets
▪ Software robot that lies on a compromised computer
▪ Collection of computers (called zombies) can be controlled by a remote server to perform various attacks/functions for the criminals
Attacks on Availability
• Denial of service (DoS) • Distributed Denial of Service (DDoS) • TCP SYN flood • Buffer overflow • ICMP attacks (Smurf) • UDP attacks (Fraggle) • Ping of Death • Electrical disturbances • Physical environment attacks
TCP SYN Flood
Variant on a Denial of Service (DOS) attack where attacker initiates multiple TCP sessions, but never completes the 3-way handshake
Smurf (ICMP Flood)
Attacker sends a ping to subnet broadcast address and devices reply to spoofed IP (the victim) using up bandwidth and processing
Electrical Disturbance
• Power spikes • Electrical surges • Power faults • Blackouts • Power sag • Brownout
Insider Threats
Employees or other trusted insiders who use their network access to harm the company
Logic Bomb
Specific type of malware that is tied to a time or logical event
Phishing
Attackers send email to get a user to click link