Network Security Threats and Attacks Flashcards

1
Q

What is IP spoofing?

A

When an IP packet has a modified (falese) source address in order to hide the identity of the sender or impersonate another computer system. Often used for DDoS attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

In what 4 broad categories are threats usually classified?

A

Interception or unauthorised viewing

Modification or unauthorised change

Fabrication or unauthorised creation

Interruption or prevention of authorised access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are some threats to network security?

A

Remote Intrusion
DoS
Malicious Code
Masquerade
Content release and modification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What different malicious code attacks are there?

A

Virus

Worm

Trojan

Logic bomb

Backdoor

Rootkit

Scripts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is remote intrusion?

A

A remote attack.

Illegal access:
connect to the internal network and gain access to the internal resources.

Illegal visiting: use the resources through remote login or hacking tools

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a passive attack versus an active attack?

A

Passive attack: attempts to learn or make use of information from the system but does not affect system resources.

Active attack: attempts to alter system resources or affect their operation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are two types of passive attacks?

A

Traffic analysis: Guessing the contents of the data by looking at the location, identity of hosts, frequency and length of messages.

Release of message contents

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How can we deal with passive attacks?

A

As they are difficult to detect the emphasis in dealing with them is on prevention rather than detection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the four categories of active attacks?

A

Masquerade

Replay: unauthorised passive capture of data and subsequent retransmission.

Modification of messages

DoS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly