Basic Concepts Flashcards

(84 cards)

1
Q

What are Bits and Bytes?

A

Digital data consists of numbers, which makes storing and transmitting data easier, more efficient, and more immune to errors. In computers, those numbers are in binary form (i.e., a number that uses only two digits).
The smallest unit of data inside the computer is a bit, which stands for binary digit. Information in the form of numbers, characters, text, sound, images, video, etc., is stored as binary digits (bits).
A bit can have only one of two values:
• 0 (off)
• 1 (on)
In that sense, it is like an on/off switch or a light bulb.
But bits can also be described as the building blocks of data, and given the vast amount of information, we need to use a lot of bits. To make that more manageable, bits are placed into groups of 8. Each group of 8 is called a byte.
A byte is the unit of measurement used in digital data. For example, a size of a file may be 2 gigabytes (GB).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Non-Textual Data?

A

Nontextual data come in a variety of standards, also known as file formats. Here are some examples of file formats:
• graphics and images: JPEG, GIF, PNG
• music and audio: MP3, WAV, FLAC
• video: AVI, MOV

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the Evolution of Communication Systems?

A

Systems used to communicate over long distances are continually evolving. Consider the transformation of communication systems from human messengers, smoke signals, and telegraphs to cell phones, e-mail, and video.
Why do you think communication systems are continually changing? The following factors seem to be the main drivers of the evolution of communication systems:
• Quality: The message sent and message received are exactly the same.
• Cost: Lower cost of communication results in greater exchange of information.
• Cost: Lower cost of communication results in greater exchange of information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are Computer Networks?

A
  • Computer networks are collections of devices (or nodes) connected to each other via different types of communication channels to share resources. Computer networks can be categorized by their conceptual structure, or topology, and by its size, or coverage area.
  • Network topology defines how the devices are connected and coverage area defines how far apart the devices are. Coverage area refers to the geographical space, such as room, a building, a city, or an area much larger than a city.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are Connecting Cables?

A

There are several types of cables that connect nodes. Two examples are shown below:
• RJ45 Connector—The RJ45 (Registered Jack 45) Connector is used for common ethernet cables. It is currently the most common connector that joins computers to networks.
• Optical Fibers—Optical fibers are used for faster networks because they can handle many communication channels at a very fast rate. Optical-fiber cables require additional equipment for converting the electrical signal to light, and vice versa.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are Network Devices?

A

There are other devices—called network devices—that are normally used in the network’s intermediate nodes. Below are some examples of network devices:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a Hub?

A

• Hub—The hub connects different devices. It is used to implement the bus topology, where all the nodes are directly connected. For example, consider a USB hub where the data is fed into the input port and then broadcasted to the other ports.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a repeater?

A

• Repeater—A repeater is similar to the hub but with additional features. Repeaters are used in places where the amplification of input signals is necessary. It regenerates the input signal and amplifies only the desirable signal, eliminating the noise component.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a Switch?

A

• Switch—A switch is an intelligent device capable of connecting multiple computers and peripherals with other networks. The switch can provide almost exactly the same speed for all the devices connected to it. Switches can be used with the star topology to provide a centralized point of connection for a LAN to another network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a Bridge?

A

• Bridge—A bridge is a switch that connects two local area networks (LANs), or two segments of the same LAN. The two LANs being connected can be alike or dissimilar. For example, a bridge can connect an ethernet with a token-ring network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a Router?

A

• Router—A router is a device used to connect multiple networks. It is used in mesh topology and can give data the best path to its destination based on different configurations, such as the shortest path. By choosing the best path, routers can prevent congestion and communication slowdowns.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a Gateway?

A

• Gateway—A gateway connects a network to the Internet or public network. Gateways therefore include more complex technologies for security and the logging of traffic as well as for allowing virtual private networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is TCP/IP?

A

The Internet is based on the TCP/IP protocol. To better understand how it works, we need to take a closer look at the underlying TCP/IP model and its 5 layers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the TCP/IP Layer 1?

A

Layer 1
– Hardware/Physical Layer In TCP/IP, the physical layer and the data link layer together form the network interface, which is realized as the network interface
card (NIC) in computers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the TCP/IP Layer 2?

A

Layer 2
– Data Link Layer (DLL) This layer is implemented in hardware as opposed to the other layers, which are implemented in software.This layer is in charge of delivery of the “frames” of data from one node of the network to the next node.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the TCP/IP Layer 3?

A

Layer 3

– Internet Protocol (IP) Layer In this layer, IP directs packets to a specific computer using an IP address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is the TCP/IP Layer 4?

A

Layer 4
– Transmission Control Protocol (TCP) In this layer, TCP directs packets to a specific application on a computer using a port number.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is the TCP/IP Layer 5?

A

Layer 5
– Application Protocol Layer This layer refers to user applications such as
WWW, e-mail, and FTP. This is where messages begin

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What are Firewalls?

A

A firewall is a software utility, hardware device, or a combination of the two, through which all traffic between an internal network and an external network (usually the Internet) must pass.
This mechanism is used to protect a trusted network from an untrusted network by allowing only authorized traffic to continue to the other side.
“Authorized” traffic is defined by the firewall owner’s security policy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What are SQL Injections?

A

Structured Query Language, or SQL, is a special language used to tell a database what to do. An SQL injection is a form of attack on a database-driven website to steal information.
In such an attack, a query (set of instructions) might have parameters (data) inserted into it that are then interpreted as instructions, causing the website to malfunction.
For example, a hacker might insert malicious SQL statements into an entry field for
execution that instructs the database to dump its contents to the attacker.
To avoid this problem, we must separate the instructions and data in a way that the
database can easily distinguish. This is usually done by sending them separately.
In SQL, this technique is known as parameterized queries.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What are Web Security Issues?

A

Web applications provide consumers and businesses significant convenience
, as banking applications, e-commerce, e-business, etc., are conducted via
web applications. Since critical consumer and business information is exchanged through these web applications, their security is a major issue for everyone.
When we access our bank account or purchase an item on the web, our data has to be exchanged with back-end databases, which are then major targets of hackers due to the critical information stored in them. In addition, hackers go after personal
information directly by redirecting consumers to their malicious sites. The top two issues related to web applications include SQL injection and cross-site scripting.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is Cross-Site Scripting?

A

Cross-site scripting (XSS) enables attackers to inject client-side script into web pages viewed by other users.
For example, imagine a victim is using a web application (e.g., e-mail or an e-commerce site) and is currently logged in to her account. If malicious code is present while she is logged in, that code sends the session information to the attacker’ s e-mail account. The attacker can then tap into the user’ s session and log in while the victim is still using the application. This is an example of session hijacking using XSS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What are Mail Servers?

A

Every e-mail you send passes through a series of mail servers along its way to your intended recipient. Mail servers can be broken down into two main categories: outgoing mail servers and incoming mail servers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What are outgoing mail servers denoted?

A

• SMTP (Simple Mail Transfer Protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
What are incoming mail servers denoted?
* POP3 (Post Office Protocol version 3) | * IMAP (Interactive Mail Access Protocol)
26
What are Webservers?
Webservers are computers that deliver (serve up) web pages. Every webserver has an IP address and possibly a domain name. Any computer can be turned into a webserver by installing server software and connecting the machine to the Internet. When accessing a webpage, your machine runs a web browser, and the browser connects to a server and requests a page. The server machine running a webserver then sends back the requested page. Three popular webservers include: ●Apache ●IIS ●NGINX
27
What is HTTP?
It is an application layer protocol. An HTML page is transmitted over the web in a standard way and format known as Hypertext Transfer Protocol (HTTP). This protocol uses TCP/IP to manage the web transmission.
28
What is HTTPS?
It is an application layer protocol. This protocol provides security for sensitive data by transmitting the HTML page in an encrypted form. A webpage using this protocol will have https: at the beginning of its URL.
29
What is FTP?
It is an application layer protocol. This protocol provides a method for copying files over a network from one computer to another. It can also be used for downloading from the web, but more often than not, downloading is done via HTTP. Sites that have a lot of downloading (software sites, for example) will often have an FTP server to handle the traffic. If FTP is involved, the URL will begin with ftp:.
30
What are the steps of the HTTP Protocol?
1. A TCP/IP virtual communication channel is created from the browser to the web server specified in the URL. 2. A HTTP GET or HTTP Post request is sent through this channel to the destination web application, which retrieves data submitted by the browser user and composes an HTML file. 3. The HTML file is sent back to the web browser as an HTTP response through the same TCP/IP channel. 4. The TCP/IP channel is shut down.
31
What is Web Markup Language?
Markup languages (ML) were originally designed for text processing and presentation such as formatting, size, and location. If you have the recipe for your favorite cake, you can use that recipe and the proper ingredients to make that cake any time you like. Markup languages are like recipes used for defining, presenting, and processing text.
32
What is XML ?
It is a Markup language. Different business data types have different logical structures (e.g., patient medical record vs. bank transaction record). For efficient processing, each business data type must be represented in well-defined formats. Such data representations are unique, and different businesses may represent the same type of business data in different formats. Extensible Markup Language (XML) is used mainly for business data specification and integration where there are different types of business data and data structures. Unlike HTML, which has predefined terms, XML does not limit what tag or attribute names can be used. Example: XML Structure Gone with the Wind Movie Classic
33
What is XHTML?
It is a Markup language. Extensible Hypertext Markup Language (XHTML) is in the XML family. It was developed to make HTML more extensible and increase interoperability with other data formats to better support flexible data presentation on different devices. The goal of shifting to XML format was for HTML to become compatible with common XML tools. Example: XHTML Structure Virtual Library

Moved to example.org.

34
What is CSS?
``` It is a Markup language.(?) A Cascading Style Sheet (CSS) is used to maintain a consistent look across various browsers. A style sheet consists of a list of style rules. An HTML file may import external cascading style sheets using a link element inside a head element. Example Rule H1 { Color:blue; Font-size:12px; } ``` Every web browser has a default way to render HTML elements. For example, HTML standards do not specify the font size of h1 (first-level header) elements, so web browser designers have the freedom to choose a font size to present h1 elements as long as it is not smaller than that for h2 (second-level header) elements. Therefore, a web page viewed on Internet Explorer can look vastly different from the same page viewed on Safari.
35
What is HTML?
It is a Markup language. HTML (hypertext markup language) is the standard markup language used to create web pages. HTML is written using tags or predefined keywords, which are enclosed in angle brackets (e.g., , ,

). Example: Basic HTML Structure

Enter your name:

Google
36
What is Penetration Testing?
An important component of computer security is testing systems and people to determine if there are any weaknesses that, if not detected and addressed, could put networks and data at risk. Penetration (pen) testing is one such type of assessment whereby the tester attempts to gain access to a computer system to determine if there are any vulnerabilities in the system and to test the system's security. Generally, a pen tester acts as an attacker, meaning they access the system without using authorized credentials. Pen testing is performed in cooperation with and at the direction of the system owner (or entity with authority over the system), who establishes the goals for the testing activities. The overall purpose of pen testing is to validate the system's security, identify weaknesses that could put the system at risk, and recommend mitigations to address the vulnerabilities. Pen testing can • provide an assessment of the defenses in use, • assess the response capabilities of the personnel in the organization charged with protecting and defending the network • evaluate the organization's crisis response and any associated plans • provide justification for the allocation of additional resources (people and/or technologies) for network security • result in recommendations to address any vulnerabilities identified.
37
What is CIA?
It is confidentiality, Integrity, and Availability
38
What is confidentiality?
The purpose of IT security is to ensure that an organization's resources, whether data, hardware, or software, are not misused. One of the five main goals of IT security is confidentiality. Confidentiality is the assurance that whatever access controls are in place are enforced. It is preserving authorized restrictions on information access and disclosure, including means for protecting personal privacy and proprietary information. Confidentiality is maintained when only authorized individuals or systems are allowed to access certain types of information.
39
What is availability?
The purpose of IT security is to ensure that an organization's resources, whether data, hardware, or software, are not misused. One of the five main goals of IT security is availability. Integrity is ensuring timely and reliable access to and use of information. Information is useful only when it is available at the right time. The availability of information depends on the functioning of the systems that store, protect, and allow or deny access to information. A good example of a threat to system availability is seen in the case of Nancy being denied access to the financials database in the FlyWithUs scenario. Reference National Institute of Standards and Technology. (2004). Standards for security categorization of federal information and information systems. Retrieved from http://csrc.nist.gov/publications/fips/fips199/FIPS-PUB-199-final.pdf
40
What is Authentication?
Authentication is the process by which credentials are presented and validated to enable access. There are a number of different methods of authentication. Passwords are the most common type of authentication and are usually coupled with user identification (user IDs). Tokens and certificates are often used in place of passwords to provide a higher level of security. Tokens can contain unique identifiers (e.g., digital signatures or keys). Tokens can also store biometric data--for example, fingerprints. There are several different types of combinations of authentication. Higher levels of security are generally associated with more levels of authentication (multifactor). For example, two-factor authentication might include a token and a password. Kerberos is a protocol for authentication which is made up of two components: a ticket (distributed by a service) for user authentication and a key that is developed from the user's password. Another authentication scheme is the Challenge-Handshake Authentication Protocol (CHAP), which uses a representation (hash) of the user's password to authenticate. Authentication involves confirming a user's identity. Authentication, a form of access control, requires users to confirm their identity before they gain access to a system. For example, a job candidate provides personal information to the employer supported by proof of identity such as a driver's license, birth certificate, or passport. Many organizations run background checks on candidates to validate their credentials. If the proof of ID and the background check prove satisfactory, the company can hire the candidate and feel safe in creating internal authentication mechanisms such as a logon ID and password.
41
What are Biometrics?
Biometrics is a general term used alternatively to describe a characteristic or a process. As a characteristic, a biometric is a measurable biological (anatomical and physiological) and behavioral characteristic that can be used for automated recognition. As a process, a biometric is an automated method of recognizing an individual based on measurable biological (anatomical and physiological) and behavioral characteristics. NSTC Subcommittee on Biometrics: Frequently Asked Questions comprises public domain material from the National Science and Technology Council. UMUC has modified this work.
42
What are Network Devices and Cables?
Computers and network peripherals are normally connected to the network as terminal devices. Terminal devices are devices where the communication ends.
43
What is Privacy ?
Privacy is the ability of an entity to exclude themselves from being identified. The Fourth Amendment to the United States Constitution first addressed the right to privacy and established that searches and seizures must meet the reasonableness requirement. Since then, other laws have been enacted that further address privacy considerations, to include: • Privacy Act of 1974, a US law that governs the disposition of personally identifiable information (PII) in federal government systems; • Foreign Intelligence Surveillance Act (FISA), which was first signed into law in 1978, with a focus on creating congressional and judicial oversight of US government surveillance activities; • Electronic Communications Privacy Act of 1986 (ECPA), which authorized electronic data transmissions by computer to be subject to collection by authorized agents of the US government; • Health Insurance Portability and Accountability Act of 1996 (HIPAA), which contains a privacy rule that regulates the use and disclosure of protected health information (PHI), which is any information that concerns the health status, provision of health care, or payment for health care linked to a specific individual. There are reporting requirements and penalties for unauthorized disclosures.
44
What is FISA?
The Foreign Intelligence Surveillance Act (FISA) of 1978 was enacted to counter international terrorism against the United States. The act legalizes the use of electronic surveillance for gathering foreign intelligence or counterintelligence. In addition, it allows the surveillance of foreign governments, foreign agents, foreign diplomats, and other foreign groups residing within or communicating from within the US. Over time, the act has been expanded to include physical searches and the use of wiretapping. The Protect America Act (2007) The Protect America Act was enacted as an amendment to the Foreign Intelligence Surveillance Act (FISA). It allows law enforcement agencies to conduct surveillance of foreign suspects reasonably believed to be outside the United States without having to obtain a warrant. Probable cause is still required before law enforcement can take any action. References Library of Congress. H.R. 6304. (2008). Thomas database. Retrieved from http://thomas.loc.gov/cgi-bin/bdquery/z?d110:HR06304:@@@D&summ2=m& United States House of Representatives. (n.d.). Foreign Intelligence Surveillance Act. Retrieved from http://uscode.house.gov/download/pls/50C36.txt
45
What is ECPA?
the Electronic Communications Privacy Act Enacted in 1986, this act protects all electronic communication from unauthorized government access. Law enforcement agencies are required to obtain search warrants to access any electronic communication. In addition, the act prohibits wiretapping of employees' electronic data transmissions and telephone conversations and also prohibits unauthorized access to employees' communication stored by employers. References Solove, D. (2006). A brief history of information privacy law. Retrieved from http://papers.ssrn.com/sol3/papers.cfm?abstract_id=914271 United States Department of Justice. (n.d.). Public law 99-508. Retrieved from http://www.justice.gov/jmd/ls/legislative_histories/pl99-508/act-pl99-508.pdf
46
What is the Internet?
The Internet is the network of all networks. In other words, all different networks belonging to different organizations around the world connect to each other through the Internet. This, in turn, creates a fully interconnected cyberspace.
47
What is IPv4?
The current version of the IP Internet is version 4 (IPv4). IPv4 addresses are made up of four numbers, known as octets, which are separated by periods. Each octet has a value between 0 and 255 and is equivalent to 8 bits; this means that an IPv4 uses 32 bits. Example of an IPv4 address: 64.233.177.101
48
What is IPv6?
IPv6 Addresses IPv6 addresses use eight groups, each equivalent to 16 bits for a total of 128 bits. Much higher than the 32 bits from IPv4, this version provides a huge range of public IP addresses. IPv6 addresses are normally represented as eight groups of four hexadecimal digits with the groups separated by colons. Example of an IPv6 address: 3FFE:1900:4545:3:200:F8FF:FE21:67CF
49
What is an IP Addresses?
An Internet Protocol (IP) address, also known as a logical address, is used to identify network devices or nodes on a network in network or IP layer. Think about some unique identifiers you use for various reasons (e.g., Social Security number, cell phone number, e-mail address, etc.). Each can be used for identification purposes in different ways and places, and they each follow different formats. In the same way, an IP address is used for identification and, depending on its version, follows a specific format. IP addresses are also categorized by various characteristics, which include: • public and private • static and dynamic • IPv4 and IPv6
50
What are Public IP Addresses?
A public IP address is a unique address of a network device on the Internet. For a device to be able to communicate on the Internet, it must have a public IP address. It is similar to a public phone number, which is required to communicate using the phone network.
51
What are Private IP Addresses?
A private IP address is a unique address in internal networks when there is no need to have public IP addresses. If we compare the public IP address to a company's public phone number, the private IP address is similar to extensions within that organization. It is similarly used to extend a public number into many private addresses.
52
What is an Static IP Address?
If you need to run your own e-mail server or web server, it would be best to have a static IP – that is, an IP address that is fixed and never changes. This is in contrast to a dynamic IP address, which may change at any time. Businesses often purchase a single static IP or a block of static IPs.
53
What is a dynamic IP Address?
Dynamic IP Addresses A dynamic IP address is not static and can change at any time. This type of IP address is issued to you from a pool of IP addresses allocated by your Internet service provider (ISP). Your computer will automatically get this number when it logs on to the network, and the number will likely be different the next time it logs in. This number can be assigned to anyone using a dial-up, wireless, or high-speed Internet connection.
54
History of the Internet
1967 The Internet, a concept first published in 1967, was built by the Defense Advanced Research Projects Agency (DARPA) as a project called ARPANET. 1969 In 1969, the first successful message was sent through the ARPANET between the University of California, Los Angeles, and the Stanford Research Institute. The ARPANET gradually expanded to include more university and larger regions from the West Coast to the East Coast. 1983 In 1983, TCP/IP protocols replaced the original ARPANET principal protocol to establish the "early Internet." 1990 In February of 1990, ARPANET was formally decommissioned. 1991 Based on the High Performance Computing Act of 1991, the National Information Infrastructure (NII) was formed to enhance the web of public and private communication networks, interoperable systems, and resources with extreme numbers of users. The development of this infrastructure was essential in providing the bed for other inventions and improvements to the Internet and web protocols and technologies.
55
What is the World Wide Web?
The World Wide Web was built based on the HTTP application layer protocol of TCP/IP, or the Open Systems Interconnection (OSI) model. The web is the front-end access to the Internet. It allows different forms of information to be transported over the Internet through web browsers. Many other protocols can also work on the web, such as File Transport Protocol (FTP), Simple Mail Transport Protocol (SMTP), Post Office Protocol Version 3 (POP3), and Internet Message Access Protocol (IMAP). The World Wide Web is much more than a collection of URLs and domain names, for a number of groups have been involved in its organization and growth. Web applications typically follow the same basic architecture that includes the web browser, the webserver, an application (app) server, and a database. Because the web accesses the Internet, application layer protocols and firewalls are used to facilitate the transmission and reception of data. A user performs a web session when interacting with the web through the web browser. During each session, there are several ways temporary data is stored. The security of data being transmitted, received, and stored causes web security issues. Two common web security issues are SQL injections and cross-site scripting.
56
What is URL (Uniform Resource Locator)?
IP addresses are used to identify locations on the Internet. However, because working with IP addresses can be complicated, a Uniform Resource Locator (URL) is used to simplify the process. URLs represent an address on the Internet using words instead of numbers. At the basic level, each URL includes the protocol, domain, and port. In addition, URLs can also include application and additional information. The anatomy of a URL includes the following: http://domain-name.port/application/resource? Query-string
57
What does HTTP do?
It is a protocol for accessing the resource domain. A name that determines a realm of some sites within the Internet; it is a collection of sites that are related in some sense, such as business sector.
58
What is a Port?
The address used in the TCP layer to conduct the data to/from a particular application layer to the network and Internet.
59
What is the application?
A folder on the server containing all resources related to a web application.
60
What is a resource?
The name (alias or nickname) of an HTML or script/program file residing on a server hard disk.
61
What is a query string?
(optional): passes user data to the web server.
62
What is a DNS?
Domain Name System (DNS) A domain is a collection of sites that are related for one of the following reasons: ● They form a proper network (e.g., all machines on a campus or all hosts on BITNET). ● They all belong to a certain organization (e.g., the US government). ● They are simply geographically close. Domain Name System (DNS) is a giant distributed database and a service that looks up and translates registered domain names and URLs into IP addresses. This allows the IP address to be translated to words, since it’s easier to remember words instead of a numerical series. For example, it is much easier to remember a web address such as random_site_name.com than it is to remember 10.1.1.1.
63
What is Pseudonymity?
Pseudonymity is the act of using a fake name or alias. There are two types of pseudonymity: traceable and untraceable. If, in a given situation, the online persona of a user who operates under a pseudonym can be linked to his offline persona, then his pseudonymity is said to be traceable. On the other hand, if no linkage can be established between the online persona of the user and his real identity, then his pseudonymity is said to be untraceable. Here is an example of pseudonymity: Nicholas Cole is a political reporter. As part of his work, he often comes across cases of unethical practices by the media. Cole wants to write about these practices, but cannot afford to do so publicly. Cole starts a media blog under a pseudonym. No one can guess Cole's true identity from his blog. However, if an individual took extra measures to uncover the author of the blog, he or she could trace Cole's identity back to the ISP. Cole's pseudonymity here is therefore traceable, even if it doesn't at first appear so.
64
What is IP Spoofing?
IP Spoofing and Packet Sniffing are common techniques for attacking and exploiting networks. In IP Spoofing, a malicious actor transmits IP packets from a spoofed source address that might appear to originate from a legitimate source. This technique is often the source of denial-of-service attacks, which are used to flood networks, resulting in the inability of legitimate traffic to reach its destination. Packet Sniffing is used to capture information in a network packet. This technique is commonly used to steal credentials (e.g., user IDs, passwords, credit card numbers). Attackers can lie dormant in a network, making them difficult to detect as they collect data.
65
What are vulnerabilities of TCP/IP?
The TCP/IP suite protocols have inherent vulnerabilities. Hackers exploit these vulnerabilities to attack networks. Some common types of attacks on TCP/IP include sniffing, session hijacking, IP address spoofing, and denial-of-service (DoS).
66
What is sniffing?
In this type of attack, the attacker uses a packet sniffer such as Wireshark or Kismet to intercept and analyze the data packets sent between the sender and receiver. This action happens without the knowledge of either the sender or the receiver. Many network applications transmit data packets as clear text; therefore, attackers may be able to collect sensitive information such as user account names and passwords. Sniffing is a data-link layer attack because the attacker operates at the data-link layer of the network.
67
What is Session Hijacking?
Session hijacking is an active version of sniffing. In this type of attack, the attacker intercepts network traffic and obtains the initial sequence number (ISN) of the communication. The ISN is the sequence number of the first packet of data being communicated and tells the attacker how many packets are being transmitted. The attacker also obtains the IP address of the sender from the packet. The attacker then impersonates the sender and communicates with the receiver. The attacker may tamper with the data he received from the sender before passing it on to the receiver. For example, an attacker may collect a confidential document, falsify it, and retransmit it to the receiver, who accepts it at face value. Session hijacking is a transport layer attack.
68
What is IP Address Spoofing?
In this type of attack, the attacker sniffs network traffic to identify the pattern of legitimate IP addresses for that particular network. The attacker then forges the IP address in the packet headers. If the network uses the IP address to authenticate the user, the attacker is able to gain access to the network through the packet with the forged IP address. The attacker can then send malicious packets to the network. For example, an attacker may introduce a Trojan or key logging application to the network after gaining access to it. IP address spoofing is a network layer attack.
69
What is Denial of Service?
Using DoS, the attacker can make a critical service or resource unavailable to legitimate users on the network. For example, an email server can be rendered useless through the sending of hundreds of email messages with large attachments. The email server will eventually crash under the load and become unavailable to legitimate users. Similarly, an attacker can flood a server with TCP requests and cause it to stop functioning normally. Attackers may also distribute the attack—by deploying several hundreds or thousands of clients. In this situation, the attack is referred to as a distributed DoS (DDoS) attack. DoS is a transport layer attack.
70
What is SMTP?
It is Simple Mail Transfer Protocol Simple Mail Transfer Protocol (SMTP) (Klensin, 2008) is a connection-oriented, text-based protocol in which an e-mail sender communicates with an e-mail receiver by issuing command strings and supplying necessary data over a Transmission Control Protocol (TCP) connection (although other transport protocols are possible). SMTP can relay mail across multiple networks (e.g. Internet and intranet). SMTP manages the e-mail transaction, using other network assets (e.g., the Domain Name Server (DNS), to identify the appropriate next-hop; and file servers on either end of the transaction) during the SMTP session. In an SMTP session, the SMTP client (sender) opens the link and exchanges parameters with the SMTP server (receiver). The transaction consists of three client commands (the IETF RFC 5321 calls these protocol units, implying that they are packets with fields), each one accepting server replies (packets with fields for receipt status): 1. MAIL command, to establish the return address, or envelope sender 2. RCPT command, to establish a recipient of this message. This command can be issued multiple times, one for each recipient. These addresses are also part of the envelope. 3. DATA to signal the beginning of the message text; this is the content of the message as opposed to its envelope. DATA consists of a message header and a message body, separated by an empty line. DATA is actually a group of commands, and the server replies twice: first to the DATA command proper, to acknowledge that it is ready to receive the text; and second, after the end-of-data sequence, to either accept or reject the entire message. The transaction is repeated at each intermediate hop point, at which the SMTP server converts to an SMTP client. The RFC details the commands to implement the protocol units above. From a security standpoint, it is easy to envision multiple entry points in the protocol for spoofing, masquerading, playing a man-in-the-middle role, intercepting, and corrupting SMTP messages. References Klensin, J. (2008, October). Simple Mail Transfer Protocol. Network Working Group, RFC 5321. Accessed August 3, 2016, at https://tools.ietf.org/html/rfc5321
71
What are Web filters?
A web filter is a component and/or software that enforces an Internet site access policy. Web filters are used in schools and homes, for instance, to protect children from inappropriate material residing at specific URLs. Web filtering devices or software can log activity and are configurable to allow discriminatory policies (e.g., policies that may be different for administrators). Web filters are normally set to either block, allow, or warn the user. For employers, web filters use broadly categorized URL lists compiled by the vendor (some are for free). Lists are regularly updated for clients. Configurable categories include pornography, gambling, games, shopping, and violence. Blocking or warning policies are common, and usually accompany written "acceptable use" policy. Among the configuration options are time of day, which allows employers to relax restrictions during leisure time—for instance, for use of Internet chat and social networking. Additionally, firms can implement black lists or white lists, meaning that certain sites are blocked or allowed, respectively. As web filtering is based on URL only, browsers may display partially blocked pages. And, as URLs occasionally change character, lists can be easily modified by system administrators. Another option is file content filtering, where downloaded files are subjected to phraseology filtering. Phraseology filtering can be applied to web mail as well.
72
What do Web Filters do?
Web filters limit access to Internet content by imposing restrictions on access based on selectors, profiles, or access permissions. Web filters are used to minimize opportunities for malicious software to gain access to a network, minimize the potential for a malicious actor to gain unauthorized access, and/or block access to offensive or unauthorized information. Web filtering can be time-consuming in that it can require the identification of acceptable (white list) access points or unacceptable (black list) access points. Because web access is dynamic, web filtering requires significant effort to keep access lists current. Web filtering can also impede legitimate access, which can be frustrating for users.
73
What is Encryption?
Encryption is a security mechanism used to convert plain, readable text into a form that is disguised. Encryption enables text to be hidden from everyone except those who are the intended recipients, who have the keys to decrypt the encrypted text. Encryption is accomplished using an algorithm (cipher) and is focused on data confidentiality. Encoding can also use algorithms (codes), but the purpose of encoding is to convert data into a form that is more easily transmitted or stored, and is focused on data availability. There are several common types of encryption that are used based on the requirements of an organization. Symmetric key encryption requires communicants to have the same keys in order to encrypt and decrypt communications. Public key encryption has a public encryption key, but in order to read (decrypt) messages, the receiving communicant must also have the decryption key.
74
What is Encryption (B)?
Encryption is a method for protecting the confidentiality and integrity of data. The following are some features of encryption: • Encryption changes a legible format to an illegible format using symmetric and asymmetric methods in order to prevent interceptors from reading the information. • Encryption is a process that depends on the sharing of a mutually established key, or that is carried out through a private/public key set. • The currently accepted National Institute of Standards and Technology (NIST) standard for strong encryption algorithms is Advanced Encryption Standard 256-bit (AES256-bit). In encryption, algorithms are used to transform data input called plaintext into an unreadable format called ciphertext. Only the user who possesses the decryption key can transform the ciphertext back into the original plaintext. Encryption is an effective way of preserving the confidentiality and integrity of an organization's data. Two types of encryption exist: symmetric and asymmetric. Symmetric encryption schemes are based on the concepts of substitution and permutation, and asymmetric encryption is based on the solution of a difficult mathematical problem.
75
What are remailers?
Many users of the web have reasons to be anonymous for good or nefarious reasons. Today web anonymizers exist for browsing, and related to this concept are remailers, which support anonymous e-mail. Using pseudonyms, e-mail can be routed to mail servers without the original user's identity. Trusted remailer systems remove mail headers, making the e-mail message untraceable and a reply from the receiver impossible. Source: Balasubramanian, K. (Ed). (2016). Cryptographic solutions for secure online banking and commerce. Hershey, PA: IGI Global. Retrieved from There are several types of remailers that use various methods for untraceability: • Type-0 remailers are the oldest and simplest systems for e-mail anonymity. The message goes from the sender to the remailer, who trips the identity of the sender. A pseudonym is assigned to the sender. • Type-I remailers are based on the same principle, but a chain of multiple independent remailers use encryption and mixing of incoming messages before sending them out. • The results of the previous step are communicated to the operating system. • Type-II remailers, to improve protection against reply attacks, divide all outgoing messages into several fixed-size packages, which are sent separately through the network. • Type-III remailers include a better system for handing replies to anonymous messages and provide improved protection against reply attacks. Source: Anonymous remailer. (n.d.). In IT Law Wiki. Used under the terms of the Creative Commons Attribution-ShareAlike license. Retrieved from http://itlaw.wikia.com/wiki/Anonymous_remailer
76
What is integrity?
The purpose of IT security is to ensure that an organization's resources, whether data, hardware, or software, are not misused. One of the five main goals of IT security is integrity. Integrity is the state of being accurate, relevant, and complete. It is guarding against improper information modification or destruction, and includes ensuring information nonrepudiation and authenticity (NIST, 2004). The goal of integrity is to ensure that unauthorized individuals or systems are unable to modify data. Here are some situations where integrity is compromised. when a virus infects a computer or information system when an unauthorized person manages to update confidential data (as in the case of FlyWithUs Airlines, in which travel agents updated financial data) when sensitive data is accidentally or deliberately modified or deleted Several threats exist to the integrity of a system. For instance, in an automated system that has not been properly tested, bulk updates could incorrectly update some databases, resulting in the compromise of data. Reference National Institute of Standards and Technology (NIST). (2004). Standards for security categorization of federal information and information systems. (Federal Information Processing Standards Publication No. 199). Gaithersburg, MD: NIST.
77
What is Non-Repudiation?
Nonrepudiation is often discussed in the context of the CIA triad by cybersecurity professionals. NIST Special Publication SP 800-53, Revision 4, defines nonrepudiation as "protection against an individual falsely denying having performed a particular action. Provides the capability to determine whether a given individual took a particular action such as creating information, sending a message, approving information, and receiving a message." Without the concept of nonrepudiation, persons have the ability to avoid responsibility and accountability for digital and messaging activities. Controls ensuring the integrity of messages sent and received aim to remove or disrupt that ability. To support nonrepudiation, public key cryptography is used and enables integrity of messages in both directions. A sender encrypts with his private key to affirm to all receivers the origin of the message. By encrypting with an intended receiver’s public key, he ensures the identity of the receiver. A classic analogy to nonrepudiation is when you provide your signature to a document. In most cases, you cannot argue that you did not see the document. Similarly, digital signatures provide nonrepudiation.
78
What is Programming?
Software is the compilation of instructions telling the computer exactly what to do to perform a specific task. Computer programming is the process of developing lists of instructions. To make the computer do any complex or meaningful task, thousands or even millions of instructions may be required.
79
What is Software Interaction?
Microsoft Word is an application software. Everything you do within this program is controlled by the program. For example, moving a Microsoft Word window around the Windows desktop is handled by the operating system (in this case, Windows). Microsoft Word doesn't need to know where it is on the screen. Windows takes care of that. Another example of the interaction between a word processor (application software) and the operating system (system software) is described in the following steps: • When a key (e.g., for the letter a) is pressed on the keyboard, a message is sent to the operating system. • The operating system sends the information to the word processor. The processor places the a in the document and performs additional tasks such as formatting, spell-checking, and moving the cursor to the next space or line. • The results of the previous step are communicated to the operating system. • The operating system displays the updates at the appropriate places on the screen.
80
What is application software?
Application software performs a function for the user, and users interact with application software to perform tasks. On smartphones and other mobile devices, this type of software is call an app.
81
What is the system software?
System software serves as the interface between applications software and computer hardware. It makes the computer's hardware resources available to applications in an orderly fashion. There are two general categories of system software: operations system and utlilities.
82
What are Data Flows Across Networks?
The evolution of information technology and computer networks has enabled the efficient flow of data across diverse networks. While data flow is a force multiplier in business operations, it also has the potential to present challenges to the protection of the data as well as the networks. Data flows can be complicated, involving not only multiple networks but diverse software and hardware components, and can include data presented in structured and unstructured forms. Additionally, data flows are impacted by people and policies. Each of these components has the potential to introduce security risks and vulnerabilities into the network. Dedicated network management functions and appropriately trained personnel can contribute to not only the best efficiencies in data flow, but the best opportunities to protect both data and networks.
83
``` Information systems have key elements that include all of the following except? A- software and hardware B- telecommunications networks C- people and policies D- framing and matting ```
D | Framing and matting have no relationship to information systems. This is the correct response.
84
An organization can be made 100 percent secure by installing which of the following? A- complex security tools B- defining security and acceptable use policies C- training employees D- none of the above
D Correct! None of the above measures will result in a 100 percent secure system because such a level of security is impossible to achieve.