Section 3: Introduction to Network Security Flashcards

1
Q

Define ‘asset’

A

A person, device, location, or information that SecOps aims to protect from attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Define ‘attack’

A

An action taken by a threat that exploits a vulnerability that attempts to either block authorized access to an asset, or to gain unauthorized access to an asset

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Define ‘risk’

A

The potential of a threat to exploit a vulnerability via an attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Define ‘SecOps’

A

The abbreviation for IT security operations; a discipline within IT responsible for protecting assets by reducing the risk of an attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Define ‘threat’

A

Something or someone that can exploit a vulnerability to attack an asset

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Define ‘vulnerability’

A

A weakness in software, hardware, facilities, or humans that can be exploited by a threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are some common security vulnerabilities?

A

Zero-day, personal devices on a network, weak or default passwords, poor physical security measures, and advanced persistent threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Describe the vulnerability ‘advanced persistent threats’

A

Malware that lays dormant for long enough to infect as many devices as possible.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Describe ‘zero-day’ threats

A

threats that may have been discovered but patches against them have not been released to the public

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are some examples of attacker types?

A

Script kiddies, nation states, insider threats, hackers; black, white, and gray hats, teams; blue, red, purple, and white, vulnerability testers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is an example of an ‘ethical’ hacker?

A
  • blue, red, and purple teams
  • White hat
  • vulnerability testers
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Describe some types of security threats

A

Wire tapping, buffer overflow, DOS and DDOS (smurfing), Social engineering, spoofing, SQL injections, port scanning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What’s easier than hacking a computer?

A

hacking a human

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Describe the sequence of events in denial-of-service attack

A

Attacker floods a computer with ICMP’s of packets forged with false addresses, which then forces the victims computer to respond to these pings to made up addresses, crashing the victims computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the difference between DOS and DDOS?

A

DDOS marks the victims computer as a sender, and employs multiple computers in a network to flood the victims computer with ICMP packets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Describe spoofing

A

Spoofing is when a hacker inserts themselves in a network and pretends to be a sender and receiver. The victim send info to the the hacker pretending to be the receiver, which the hacker forwards to the legit receiver. Then the hacker pretends to be the sender, and receives the info from the legit sender

17
Q

Describe an SQL injection

A

the hacker adds an sql query to an input designed for a user to search a database. The query then return sensitive information normally outside of an everyday users access

18
Q

Describe port scanning

A

Hacker scans a computer for open ports. After identifying the open ports, the hacker can then look for exploits to the connecting site or application

19
Q

Describe wire-tapping

A

a hacker uses a packet sniffer to monitor network traffic

20
Q

What is one of the largest jobs in SecOps?

A

managing the risks of attacks and acting both proactively to prevent or mitigate the damage and reactively to stop the attack

21
Q

What is an aspect of in-depth security?

A

Using multiple layers of security in an overlapping manner to create rings of protection

22
Q

Define CIA in InfoSec

A

Confidentiality, Integrity, and Availability. A model used to balance protecting sensitive data while granting access to authorized users.

23
Q

Explain confidentiality in the CIA model

A

Privacy of data. Characteristics include; ensuring only the intended recipient of the information can access it, following a need-to-know policy, reducing exposure by destroying copies of information that is no longer needed.

24
Q

Explain integrity in CIA

A

Identifies the trustworthiness of the information. “Is it possible to identify where the information has come from, and if the data has changed since it was originally sent”.

25
Q

Explain availability in CIA

A

Ensures data is accessible to authorized users.