Week 1 Flashcards
What are the layers of the OSI Model?
7: Application Layer - Type of communications: E-mail, file transfer. Client/Server
6: Presentation Layer - Encryption, data conversion: ASCII to EBCDIC. BCD to binary, etc.
5: Session Layer - Starts, stops session. Maintains order.
4: Transport Layer - Ensures delivery of entire file or message
3: Network Layer - Routes data to different LANs and WANs based on network address
2: Data Link (MAC) Layer - Transmits packets from node to node based on station address
1: Physical Layer - Electircal Signals and Cabling
What is DNS?
- Refers to the Domain Name System, DNS Server, or Name Server
- An IP Address is like a telephone number, but instead of having to remember the specific IP address for where you want to go, the DNS will connect you to an easy to remember name such as pitt.edu.
- The proper term for the process is DNS name resolution. Where the DNS server resolves (translates) the domain name (pitt.edu) to an IP address.
Explain the makeup of the domain.
https://my.pitt.edu/portal/server.pt
Top Level Domain: .edu
Domain name: pitt
Host Name: www
Protocol: https://
Computer Name (CName): my
Page Path: /portal/server.pt
http://hockey.fantasysports.yahoo.com
Protocol/CName/SubDomain/Domain/Top Level Domain
What is spoofing? And what type of attacks are there?
A situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining an illegitimate advantage
Man in the Middle: URL Spoofing (fake a PNC bank page)/Phishing/Login Spoofing - Where they fake the login page to get you to give your information
Caller ID - Fake the Caller ID so you think you are talking to someone from a certain number or orgranization when in fact it is someone else
Email Address/Header - It is easy to manipulate one’s email address so that it comes up as a different address than the original sender.
What is a DoS attack? What is a D-DoS attack?
Denial of Service is an attacked attempting to make a computer(s) resource unavailable to its intended users.
Distributed Denial of Service - Same idea as a DoS, but it makes use of a wide network of computers to make an attack on a grand scale.
All you are doing is requesting a website over and over, which sends packets to your computer.
What is the AIC Triad?
- Integrity - integrity means that data cannot be modified undetectably
- Confidentiality - to prevent the disclosure of information to unauthorized individuals or systems
- Availabitity - computing systems used to store and process the information, the security controls used to protect it, and the communication channels used to access it must be functioning correctly
What is the Ease of Use Triangle?
Security, Functionality, Ease of Use. It can’t be perfectly at each point, but you need to have all three.
What is Social Engineering?
The art of manipulating people into performing disclosure actions or divulging confidential information. While similar to a confidence trick or simple fraud, the term typically applies to trickery for information gathering or computer system access and in most cases the attacker never comes face-to-face with the victim.
What are the 7 deadly sins of social engineering?
- Sex Appeal: People think an attractive person is into them online, while suddenly something could happen to them and they ‘need money.’
- Greed: Nigerian lottery scam
- Vanity: Scammers convince people that THEY were the ONLY person chosen and won something or got an exclusive offer, and usually ask for their bank account info to get it there
- Sloth: People are lazy and don’t verify the authenticity of the source
- Trust (Implied/Transiet): Implied - Scammers say they are from a high-profile brand and can be trusted. Transient - Scammers pretends to be a trusted companion of someone they trust.
- Compassion: Someone is desperate for money and posts something on FB, but really it’s a scam
- Urgency: Similar to Compassion scams - They need to money right away and time is running out. Call a company acting as an agent of the company and say they need the information right away.
What is a virus?
–a computer program that can copy itself and infect a computer without permission or knowledge of the user. A virus needs to be attached to some type of host for the infection to take place/transferred.
What is a worm?
–a self-replicating computer program. It uses a network to send copies of itself to other nodes (computer terminals on the network) and it may do so without any user intervention. Unlike a virus, it does not need to attach itself to an existing program.
What is a standard virus?
–Small piece of software that piggybacks on a real program.
What is an email virus?
–This travels via email and may or may not require user interaction to be executed.
What is a rootkit?
–A rootkit is a program (or combination of several programs) designed to take fundamental control of a computer system, without authorization by the system’s owner(s). Access to the hardware (e.g., the reset switch) is rarely required as a rootkit is intended to seize control of the operating system running on the hardware.
What is adware?
–programs that target ads to end user computers
What is spyware?
–programs that collect information about you and your computer
What is a dialer?
–program that would dial 900 numbers (this one is a bit out dated with the majority of people connected to the Net via broadband)
What does Title 15 refer to in the US Code?
Credit Card Fraud and Software Piracy
What does Title 17 refer to in the US Code?
Copyright Infringment