Lesson 14: Network Security Flashcards
(80 cards)
Organizations must make sure that their staff does not send sensitive information outside the network.
Data Loss Prevention
It is a set of rules and
configurations designed to protect the integrity, confidentiality and
accessibility of computer networks and data using both software and hardware technologies.
Network Security
It is launched from a large number of other host
machines that are infected by malicious software controlled by the attacker.
Distributed denial-of-service (DDoS)
A type of malware that blocks access to the victim’s data and threatens to publish or delete it unless a ransom is paid.
Ransomware
A program that hides in a useful
program and usually has a malicious function.
Trojans
ACRONYM: DLP
Data Loss Prevention
In this attack, an attacker exploits the use of the buffer space during a Transmission Control Protocol (TCP) session initialization handshake.
TCP SYN flood attack
This attack causes the length and fragmentation offset fields in sequential Internet Protocol (IP) packets to overlap one another on the attacked host; the attacked system attempts to reconstruct packets during the process but fails.
Teardrop attack
It is a broad term that covers a multitude of technologies,
devices and processes.
Network Security
A very targeted type of phishing activity. Attackers take the
time to conduct research into targets and create messages that are personal
and relevant.
Spear phishing
A dictionary of common passwords is used to
attempt to gain access to a user’s computer and network.
Dictionary attack
Act as a barrier between the untrusted external networks and your trusted internal network.
Firewall Protection
A hacker detects the information by listening
to the message transmission in the network.
Passive eavesdropping
These viruses conceal themselves through
varying cycles of encryption and decryption.
Polymorphic viruses
Botnets can be mitigated by:
- RFC3704 filtering
- Black hole filtering
ACRONYM: VPN
Virtual Private Network
Used by an attacker to convince a system that it is
communicating with a known, trusted entity and provide the attacker with
access to the system.
IP Spoofing
Means using a random approach by trying different passwords and hoping that one work
Brute-force password guessing
Scans network traffic to actively block attacks.
Intrusion Prevention Systems
This attack involves using IP spoofing and the ICMP to saturate a target network with traffic.
Smurf attack
ACRONYM: PHP
Hypertext Preprocessor
A hacker actively grabs the information by
disguising himself as friendly unit and by sending queries to
transmitters.
Active eavesdropping
Occur through the interception of network traffic. An attacker can obtain passwords, credit card numbers and other confidential information that a user might be sending over the network.
Eavesdropping attack
Usually attach themselves to
executable code, such as .exe files.
File infectors