chapter 4 Flashcards
SCP?
SCP= Secure Copy: securely transferring files between hosts uses SSH technology.
FTP?
FTP= File Transfer Protocol: transfer a file between hosts over a network but all text is shown in plain text over network and is not secure.
what is a Network drive?
a HDD/ storage on another computer. depends on permissions but some can only ready, write ,etc.
command used to map a remote systems drive is?
net use
the command to display a list of the system’s network shares?
Net view
CIA?
Confidentiality, Authenticity and Integrety
what are the 4 goals to secure a network design?
- Availability: DOS attacks used, 2. Confidentiality: protecting network design, 3. Functionality: altering how packets are sent/ processed by network devices, 4. Access Control: control of access to systems.
Fingerprinting a network?
identify devices within a network based on network traffic information such as port numbers, TTL values, etc. can be passively monitored.
what are the 4 goals to secure a network design?
availability, confidentiality, functionality, Access Control
death of the perimeter?
the idea that creating a 100 percent secure network is impossible
flooding?
DOS attack where tons o website connection requests are made with the intent of using up the servers ram/ cpu till it crashes.
spoofing?
attacker hides own ip address by using a fake one but as a result can not receive replies and must monitor progress of attack by sending separate connection requests from a legitimate ip address and seeing if they are able to still connect.
Backscatter?
when a victim sends a series of replies to the spoofed IP address and the spoofed address happens to be an unintended user/device. the unintended device then is overwhelmed and losses service.
TCP?
transmission control protocol: guarantees delivery of IP packets over the internet.
SYN?
Synchronization: 1st part of a 3 way TCP handshake for a network connection
SYN-ACK:
Synchronization- Acknowledgement: second part of a 3 way network connection TCP handshake
ICMP?
Internet Control Message Protocol: supervisor. protocol mesage to send error messages between computers
HTTP?
Hyper text transfer protocol: sending data over the web protocol.
Intermediary/ Intermediaries?
Bots: compromised devices running malware are remotely controlled by a bot-master (hacker) to do a DDOS attack.
Handler?
a compromised device that is used to remotely control bots (botmaster) while also hiding the identity of the attacker because the hacker is indirectly controlling the bots.
peer to peer redirect:
redirects legitamite p2p traffic to a specific host as if its the P2P server. **no bots needed.
Reflected attack?
spoofed IP that is the IP of the victim, packets sent to high volume server that is legitimate company that then responds to the spoofed IP causing a DOS.
DRDOS?
Distributed Reflected Denial Of Service: uses a botnet and a reflected attack.
Smurf Flood:
incorrectly configured router used to flood devices, uses broadcasts from inside the network.