module 1 Flashcards

1
Q

What are the regulations in Ethical Hacking ?

A
  • use information learned only for educational purposes.
  • never use tools for malicious purposes or for fun.
  • do not misuse the information for gaining unauthorized access.
  • inform loophole
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the basic terminology of hacking ?

A
  • Vulnerability
  • Threat
  • Intrusion
  • Breach
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is vulnerability?

A

Weakness in the network and/or its protocol.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is threat?

A

Set of circumstances that has the potential to cause harm.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is intrusion?

A

Any act or event that compromises the information on a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is breach?

A

Breakdown of security of the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is white hat hacker?

A
  • ethical hacker
  • non-malicious reasons
  • clear code of ethics
  • work together to improve security
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is black hat hacker?

A
  • get information without authorization

- for crime purposes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is grey hat hacker?

A
  • ambiguous ethics borderline.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the 5 generic intrusion types?

A
  • interruption
  • interception
  • modification
  • fabrication
  • invasion
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is interruption?

A
  • making access to a resource become unavailable

DOS attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is interception?

A
  • Gaining unauthorized access to information

eavesdrops
sniffing: active/ passive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is modification?

A
  • change the information of a resource

Man-in-the-middle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is fabrication?

A
  • insertion of malicious objects into a system

malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is invasion?

A
  • Taking control of a resource and stealing information

Session Hijacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Five/six levels of intrusion ?

A

0: Normal System User- no intrusion
1: Intrusion occurs, but no evidence of damage and no trail is left. Example: Passive Sniffing
2: Intrusion occurs, there is no evidence of damage but a trail is left. Example: Active Sniffing
3: Files are damaged, programs and data are altered. Example: Malware
4: Services are disrupted. Example: Denial of Service
5: Cyber-espionage/Cyber-felony is committed – valuable information is stolen. Example: Session Hijacking

17
Q

what are the anatomy of a Cyber Attack?

4 steps.

A
  • Gather information
  • Look for vulnerabilities
  • Get access to the network
  • Launch the attack
18
Q

What are the tools for gather information?

A
  • nslookup/dig IP address finder
  • netcraft web server information gather
  • traceroute IP address tracers
  • Nmap port scan hosts finder
  • wireshark traffic monitoring tools
19
Q

What are the Techniques for Gaining Access to the Network?

A
  • Password Crackers
  • Keyloggers
  • Address Spoofers
20
Q

What is Denial of service Dos?

A
  • Bring down a network so that legiBmate users cannot access it.
21
Q

What is Man-in-the-middle attack?

A
  • Traffic will now flow through the attacker’s machine without the knowledge of the client or the server
22
Q

What is Data Modification ?

A
  • Man-in-the-middle attack can be extended to perform data modification – insert/drop/alter packets in transit
23
Q

What is Session Hijacking ?

A

watching an ongoing communication between a client and a server and recording session numbers, IP addresses

The aFacker then “zaps” the client with a DoS attack and then takes over the existing connection by spoofing the client to the server using the same addresses, session numbers,

24
Q

What is Replay Attack ?

A

Watch an ongoing communication and record transaction and replay the recorded packets to the server later.
• Works when server does not save the state information.

25
Q

What are the seven security goals ?

A
Confidentiality
Integrity
Authentication
Non-repudiation
Certification
Access Control
Availability
26
Q

Confidentiality 保密

A

no eavesdropping

27
Q

Integrity 完整

A

message sent = message received

28
Q

Authentication 验证

A

sender validation

29
Q

Non-repudiation (rejection)

A

non denial of a transaction

30
Q

Certification 鉴定

A

third party validation

31
Q

Access Control

A

who can access what and when

32
Q

Availability 可获得性

A

resource are always available to legitimate users