Securing Networks Flashcards
Privilege Escalation
§ Occurs when a user is able to gain the rights of another user or administrator
§ Vertical Privilege Escalation
§ Horizontal Privilege Escalation
Backdoor
A way of bypassing normal authentication in a system
keys to having network security
An IPS, proper firewall configs, network segmentation, and firmware updates are the keys to having network security
Electromagnetic Interference (EMI)
§ A disturbance that can affect electrical circuits, devices, and cables due to radiation or electromagnetic conduction
§ EMI can be caused by TVs, microwaves, cordless phones, motors, and other devices
§ Shielding the cables (STP) or the source can minimize EMI
Radio Frequency Interference (RFI)
§ A disturbance that can affect electrical circuits, devices, and cables due to AM/FM transmissions or cell towers
§ RFI causes more problems for wireless networks
Crosstalk
§ Occurs when a signal transmitted on one copper wire creates an undesired effect on another wire
§ UTP is commonly used more often than STP
Data Emanation
§ The electromagnetic field generated by a network cable or device when transmitting
§ A Faraday cage can be installed to prevent a room from emanating
§ Split the wires of a twisted-pair connection
Protected Distribution System (PDS)
Secured system of cable management to ensure that the wired network
remains free from eavesdropping, tapping, data emanations, and other
threats
Service Set Identifier (SSID)
§ Uniquely identifies the network and is the name of the WAP used by the
clients
§ Disable the SSID broadcast in the exam
Rogue Access Point
An unauthorized WAP or Wireless Router that allows access to the secure
network
Evil Twin
A rogue, counterfeit, and unauthorized WAP with the same SSID as your
valid one
Wireless Encryption Types
Pre-Shared Key (PSK)
Wired Equivalent Privacy (WEP)
WiFi Protected Access (WPA)
WiFi Protected Access version 2 (WPA2)
Pre-Shared Key
Same encryption key is used by the access point and the client
Wired Equivalent Privacy (WEP)
§ Original 802.11 wireless security standard that claims to be as secure as a wired network
§ WEP’s weakness is its 24-bit IV (Initialization Vector)
IV (Initialization Vector)
WiFi Protected Access (WPA)
Replacement for WEP which uses TKIP, Message Integrity Check (MIC),
and RC4 encryption
TKIP, RC4