401_3 Flashcards
Internet Security Technologies (141 cards)
What is Kevin Mitnick vs. Tsutomu Shimomura
Famous example of attack
Compromised 3 major tenant of security CIA (confidentiality, integrity and availability)
Accessing files that were not his (confidentiality)
penetrating network resources he was not granted access (confidentiality)
Executing a SYN flood as a DoS (availability)
3-6
What is a trust relationship?
Means that a computer is familiar with another computer and trusts the information that is coming from it.
3-8
How do complex attacks against specific target usually start?
With a reconnaissance phase in which the attacker maps out the lay of the LAN.
3-8
What is the reconnaissance phase of an attack?
Phase in which attacker determines which hosts are present and gathering as much information about them as possible.
3-8
What is finger?
A Unix service that can return information about users.
3-9
What is the use of a .rhost file?
It directs one computer to accept incoming login connections from the other computer on trust and not prompt for a password.
3-9
What is the use of a hosts.equiv file?
Directs one computer to accept logins for all users on a machine on trust and not prompt for a password.
3-9
What is showmount?
Unix command to lists the file system exported by an NFS file server.
3-9
What is rpcinfo?
Unix command to enumerate the various RPC-based services on a remote machine.
3-10
What is Sun’s Network Information Service (NIS)?
Network user database included with most varieties of Unix.
3-10
What is IP spoofing?
Sending packets to a remote computer but lie about your source IP address.
3-11
What is SYN flooding?
Sending numerous SYN packets to the machine to be silenced but never completing the TCP handshake protocol.
3-12
What is the role of the initial sequence number in negotiating a TCP connection?
To indicate the next byte the ACKer expects to receive.
3-13
The information security cycle (also known as the risk management cycle) consists of what three parts?
- Prevention
- Detection
- Response
In modern-day information security what is often considered to be one of the most important tasks for system administrators and security professional alike.
Patching of systems and applications.
What two helpful functions does a firewall provide?
- Prevents outsiders from accessing internal network services
- Prevents outsiders from using spoofed IP addresses that should only appear inside your own network.
What are three fairly common types of malicious code?
- Logic bombs
- Trojan horses
- Trap doors or back doors
What are some of the more interesting DoS attacks?
- smurf
- SYN floods
- DDoS
When does a DoS attack occur?
When a user is deprived of the use of some data, computing resource, or service due to malicious actions on the part of an attacker.
What happens to the number of possible keys for every bit you add to the key length?
It doubles
What is probably the least efficient attack?
Brute force
What is the primary purpose of a browsing attack?
Reconnaissance
What are race conditions also know as?
Time of Check/Time of Use or TOC/TOU attacks
What is a firewall?
A means to control what is allowed across some point in a network as a mechanism to enforce policy.