Introduction to Network Security Flashcards Preview

Network Security > Introduction to Network Security > Flashcards

Flashcards in Introduction to Network Security Deck (22)
Loading flashcards...
1
Q

Define vulnerability

A

weakness in the network or its protocol

2
Q

Define threat

A

set of circumstances that has the potential to cause harm

3
Q

define intrusion

A

an act or event that compromises the information on a network

4
Q

define breach

A

a breakdown of the security of a network

5
Q

What are the 5 intrusion types? Give an example of each

A
Interruption - DoS
Interception - Eavesdropping
Modification - Man in the Middle
Fabrication - Malware
Invasion - Session Hijacking
6
Q

What are the levels or phases of intrusion?

A

Level 0 - no intrusion
Level 1 - Intrusion occurs, no trail
Level 2 - Intrusion occurs, no damage, trail is left
Level 3 - Files are damaged and data is altered
Level 4 - Services are disrupted
Level 5 - Valuable information is stolen espionage and felony

7
Q

What is an example of an IP address finder

A

NSLOOKUP/DIG

sends queries to dns about networks and extracts the IP address blocks assigned to a particular network

8
Q

What is an example web server information gatherer

A

Netcraft

Web based tool that lists information such as the type and version of web server, geo location, last update

9
Q

What is an example of an IP address tracer?

A

traceroute, tracert, visualroute
Tools that use ICMP packets to trace the route to a destination host. The hostname, IP address, and the round trip time to each intermediate node are listed

10
Q

What is an example of an IP location finder?

A

iplocation.net

Determines the geo location of an IP address

11
Q

What is an example of a port scanner ++

A

nmap, zenmap
Determines what hosts are available on the network what services those hosts are offering, and what OD versions they are running, what type of packet filters/firewalls are in use, etc

12
Q

What is an example of a port scanner?

A

Angry IP Scanner
Cross platform, lightweight, and very fast IP and port scanner; Can scan an IP address in any range or any of their ports

13
Q

What is an example of traffic monitoring?

A

Wireshark

Captures every frame that passes on its network, allowing analysis of the captured fram

14
Q

What is an example of traffic monitoring?

A

TCPDump

Unix based network sniffer/analyzer

15
Q

What is an example of a wireless network information gatherer (Active sniffer)

A

Netstumbler
enables wireless network information gathering. displays MAC address of the access point, their names, channel numbers, vendors, whether security is enabled or not, and signal to noise ratio.

16
Q

What is an example of a wireless network information gatherer (Passive sniffer)

A

Kismet
Wireless network detector, sniffer, and intrusion detection system. Can even decloak hidden networks that have turned off SSID beaconing KisMAC is the Mac version

17
Q

What are some tools for vulnerability testing?

A
NESSUS
Nexpose
GFLIANguard Network Security Scanner
NIKTO
Nipper Studio
18
Q

What are some tools for gaining access?

A

Brute force
Password crackers
Keyloggers
Address Spoofers

19
Q

What are some tools and techniques used by hackers for launching attacks?

A
DoS
Man in the Middle Attack
Data Modification
Replay Attack
Injection of Malicious Code
20
Q

What are some “other” attack tool categories?

A
Binders and cryters
Bots
FB hacking tools
GMail hacking tools
Mail bombers
Mobile hacking tools
Virus creator
Website hacking tools
21
Q

What is the crux of secure network design?

A

Protect your network and protect your transaction

22
Q

List the 7 security goals and what they mean

A

Confidentiality - no eavesdropping
Integrity - message received = message sent
Authentication - sender validation
Non-repudiation - source must not be able to deny a transaction
Certification - third party certifies this source as good
_____the above can be achieved via cryptography

Access control - who can access what and when
Availability - system resources are always available for legitimate users
These can be achieved by Firewall