Telecommunications and Network Security Flashcards
Attackers Methodology
- Target Acquisition
- Target Analysis
- Target Access
- Target Appropriation
- Sustain Control
Types of Scanners (Network Security Tools)
- Discovery (Nmap)
- Compliance
- Vulnerability (Nessus)
______ access, not ______ access is the driving force behind the design of most network protocols
Fast, Secure
Physical Layer
- Analog vs. Digital Communications
- Network Topologies
- Cabling
- Wireless Transmission
- Mobile Telephony
Data Link Layer
- Architecture
2. Transmission Technologies
Data Link Layer Technolgies
- Ethernet
2. Wireless LANs
Bluetooth
Shore-range wireless communications
Very vulnerable
Bluejacking
Allows an anonymous message to be displayed on the victim’s device
Buffer Overflow
Attacker can remotely exploit bugs in software on Bluetooth-enabled devices
Blue Bug Attack
Attacker can use the AT commands on a victim’s cell phone to initiate calls, send SMS messages, etc.
SNARF Attack
Unauthorized access of information from a wireless device through a Bluetooth connection; access to calendar, contacts, emails, text messages, etc.
Theft of information
Virtual Private Network (VPN)
Encrypted tunnel between two hosts that allows them to securely communicate over an untrusted network
Secure Shell (SSH)
Allows users to login to remote computer over an encrypted tunnel
Protects integrity of communications and strong authentication