Lesson 7 Configuring SOHO Network Security Flashcards
(65 cards)
What are the three properties of secure information?
- Confidentiality: means that certain information should only be known to certain people.
- Integrity: means that the data is stored and transferred as intended and that any modification is authorized.
- Availability: means that information is accessible to those authorized to view or modify it
What is cybersecurity?
Protection of computer systems and digital information resources from unauthorized access, attack, theft, or data damage.
What does shoulder surfing in cybersecurity mean?
Shoulder surfing is a social engineering tactic to obtain someone’s password or PIN by observing him or her as he or she types it in.
What does tailgating mean in cybersecurity?
Tailgating is a means of entering a secure area without authorization by following closely behind the person who has been allowed to open the door or checkpoint.
What does piggybacking mean in cybersecurity?
Piggybacking means that the attacker enters a secure area with an employee’s permission.
What is spear phishing?
Email-based or web-based form of phishing which targets specific individuals.
What is whaling?
An email-based or web-based form of phishing which targets senior executives or wealthy individuals.
What is vishing?
Social engineering attack where the threat actor extracts information while speaking over the phone or leveraging IP-based voice messaging services (VoIP).
What is an evil twin attack?
Wireless access point that deceives users into believing that it is a legitimate network access point.
What is a footprinting threat?
Footprinting is a phase in an attack or penetration test in which the attacker or tester gathers information about the target before attacking it. It is an information-gathering threat in which the attacker attempts to learn about the configuration of the network and security systems.
What is an on-path attack?
An on-path attach is where the threat actor makes an independent connection between two victims and is able to read and possibly modify traffic. It is a specific type of spoofing where the threat actor can covertly intercept traffic between two hosts or networks. An example is an evil twin attack.
What is a DoS attack?
Denial of Service attack is any type of physical, application, or network attack that affects the availability of a managed resources. A DoS attack tries to overload a service by bombarding it with spoofed requests.
What is a DDoS?
Distributed denial of service is an attack that uses multiple compromised hosts (a botnet) to overwhelm a service with request or response traffic.
What is a botnet?
A botnet is a group of hosts or devices that have been infected by a control program called a bot that enables attackers to exploit the hosts to mount attacks.
What is a dictionary password attack?
Dictionary is a type of password attack that compares encrypted passwords against a predetermined list of possible password values.
What is a brute force attack?
Brute force is a type of password attack where an attacker uses an application to exhaustively try every possible alphanumeric combination to crack encrypted passwords.
What is an XSS attack?
A cross-site scripting (XSS) attack is malicious script hosted on the attacker’s site or coded in a link injected onto a trusted site designed to compromise clients browsing the trusted site, circumventing the browser’s security model of trusted zone.
What is a SQL injection attack?
A SQL injection attack is an attack that injects a database query into the input data directly at a server by accessing the client side of the application.
What is a hash?
A hash is a short representation of data. A hash function takes any amount of data as input and produces a fixed-length value as output.
What is a cryptographic hash?
A cryptographic hash performs the hash process as a one-way function that makes it impossible to recover the original value from the hash. Cryptographic hashes are used for secure storage of data where the original meaning does not have to be recovered (ie passwords).
What are the two most used cryptographic hash algorithms?
- Secure Hash Algorithm (SHA)
-Message Digest (MD5) - older and getting phased out
What is a symmetric encryption?
A symmetric encryption is a two-way encryption scheme in which encryption and decryption are both performed by the same key. Aka shared-key encryption.
What is asymmetric encryption cipher?
Asymmetric encryption is a cipher that uses public and private keys. The keys are mathematically linked, using either Rivel, Shamir, Adleman (RSA) or elliptic curve cryptography (ECC) alogrithims, but the private key is not derivable from the public one. An asymmetric key cannot reverse the operation it performs, so the public key cannot decrypt what it has encrypted.
What is a digital signature?
A digital signature is a message digest encrypted using the sender’s private key that is appended to a message to authenticate the sender and prove message integrity. It proves that a message or digital certificate has not been altered or spoofed.