Protecting Networks Flashcards
CIA in network security stands for?
Confidentiality
Integrity
Availability
Three things that can cause you security problems on your network:
Threat - internal and external
Vulnerability
Exploit
One example of an Exploit is called _________ where an external threat / computer tries to act like a node on your network and installs a trojan virus on your network to gain access.
spoofing
Threats can cause ______________, vulnerabilities create _________ and exploits can give unauthorized users access to your network.
Vulnerabilities
Exploits`
this is a designed layer of security designed in a way that if a system goes down there is some other system or measure in place.
Defense in Depth
Layers of the Defense in Depth are :
1st - perimeter first line of defense
between these 2 layers sits the: Screened Subnet or DMZ
2nd - Network layer - Network segmentation enforcement and
network access control ( separate VLANs )
3rd - Host Endpoint ( all host on your network ) update policies and
firmware
4th - Application - Test all apps
5th - Data Layer - lowest endpoint ( protecting all data ) like with
Separation of Duties or no user should be given enough rights to abuse a system by themselves.
these are used to lure attackers to test for vulnerabilities:
Honey Pots
Honey nets
_______ __________ breaks the network down into subnets for improved security
network Segmentation
_________DHCP servers can be used to perform an on-path ( man in the middle) attack
Rogue
If the ___ ________ is outside of the network ID, then you have a Rogue DHCP server.
IP Address
To help prevent an attacker from entering your network internally, be sure to _________ any unused ports / jacks.
disable
This attack is designed to deny anyone service or access to a network. It’s done when you have so many people trying to access a server and they can’t, basically flooding the server all at once.
Denial of Service ( DoS ) attack
Types of DoS attacks include:
Volume Attack - Ping Flood, UDP flood, ( nothing wrong just a lot of it )
Protocol Attack - SYN Flood or SYN Attack (most common )
Application Attack - slow Loris Attack, Smurf Attack,
Amplification Attack
Getting a bunch of computers or BotNet to attack a single host that is a big problem today is called:
Distributed denial of service ( DDoS)
Computers that are trying to attack servers that are called Zombies are in a group called:
BotNet
This attack is started when a node in a private network has been taking over and is turned into a Zombie, then turning the rest of the network into a BotNet, that then takes commands from the C&C server.
Command and control ( C&C or C2)
this attack is where a 3rd party intercepts data and information between a 2 party conversation and uses the information they gain to their own advantage
Man in the middle attack
Examples of ways for a Man in the Middle attack to happen are:
Through wireless networks (biggest problem)
Bluetooth
NFC or cell phones
this type of Man in the Middle attack is used more in wired networks and its where making something in the attackers address looks like the victims address. ( mac address or IP address or DNS address )
spoofing
When a Man in the Middle attack involves IP address stealing, is very noisy, its sending out packets to different target machines, lying to them so that their ARP caches are confused is called:
ARP poisoning
This man in the middle attack happens when you misspell or mistype the wrong URL and get sent to another site is called:
URL hijacking or Typosquatting
Somebody doesn’t keep the domain updated / paid and then buys it up and puts a lot of bad information on the website
Domain Hijacking
Things that can actually be done once you get the data or information from a man in the middle attack:
Replay Attack for secure communication
Downgrade attack, effects webpages
Session Hijacking - where 2 people are already in a conversation and you push out bad information to those computers
Man in the Middles attacks are now called;
on-path attacks
To help prevent a Man in the middle attack, make sure to:
Harden your network or make it more secure
There are 2 types of “Password Attacks”:
Brute force -
Dictionary -
__________ and ________policies are a great way to protect against password attacks
Password and Account