NETWORK SECURITY Flashcards

1
Q

Freedom from risk, danger, doubt, anxiety, and fear.

A

Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Why do we need Security?(3)

A
  • Protect vital information while still allowing access to those who need it.
  • Provide authentication and access control for resources.
  • Guarantee availability of resources.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Who is vulnerable?(7)
(possible quesion?)

A
  • Financial institutions and banks
  • Internet service providers
  • Pharmaceutical companies
  • Government and defense agencies
  • Contractors to various government agencies
  • Multinational corporations
  • ANYONE ON THE NETWORK
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Common Security Attacks and their Countermeasures

attacks = countermeasures

A
  • Finding a way into the network = Firewalls
  • Exploiting software bugs = Intrusion Detection Systems
  • Denial of Service = Ingress Filtering
  • TCP Attacks/ hijacking = IPSec
  • Packet Sniffing = Encryption
  • Social Problems = Education lol
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

is like a castle with a drawbridge.
Only one point of access into the network.

A

Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Used to monitor for suspicious activity on a network.
Uses “intrusion signatures”

A

Intrusion Detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Can take a dictionary of words, crypt() them all, and compare with the hashed passwords.

A

Dictionary Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Make a network service unusable, usually by overloading the server or network.

A

Denial of Service (DOS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Different kinds of DoS attacks(4)

A
  1. SYN flooding
  2. SMURF
  3. Distributed attacks/ denial of service
  4. Mini Case Study: Code-Red
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Send packets with bogus source address

A

SYN flooding
(Synchronous)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Large number of machines respond back to victim, overloading it

A

SMURF

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Same techniques as regular DoS, but on a much larger scale.

A

Distributed Denial of Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

launched a DDOS attack against www1.whitehouse.gov from the 20th to the 28th of every month
Spent the rest of its time infecting other hosts.

A

CodeRed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

host may trick destination into believing that the packet is from a trusted source.

Attacker can insert malicious data into the TCP stream, and the recipient will believe it came from the original source

A

TCP Attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Encrypts data before transport.

A

IPSec

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Other hosts listening on the wire from sent packets to detect collisions.

A

Packet Sniffing

17
Q

People can be just as dangerous as unprotected computer systems.

A

Social Problems