Network Security Flashcards

(60 cards)

1
Q

What is a network in the context of computer security?

A

A collection of communicating hosts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the key characteristics of a Local Area Network (LAN)?

A

Covers a small area (e.g., building), connects PCs, printers, file storage; allows data/program/device sharing; locally controlled, physically protected, limited scope (e.g., single department).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What defines a Wide Area Network (WAN)?

A

Single organizational control, covers large distances, physically exposed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are Campus Area Networks (CANs) and Metropolitan Area Networks (MANs)?

A

CANs connect multiple LANs in a campus; MANs cover a city.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How does anonymity make networks vulnerable?

A

Attackers can operate remotely, hiding their origin by routing attacks through other hosts, complicating computer-to-computer authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Why do networks have many attack points?

A

Large networks offer multiple targets and origins; one host may enforce strict security, but remote hosts may not, creating vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How does resource sharing increase network vulnerability?

A

More sharing of resources/workload across systems makes single-machine access controls inadequate for network security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How does system complexity contribute to network vulnerabilities?

A

Networks combine different OSs/versions, requiring complex control systems. Modern desktops have more power, amplifying attacker capabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is an unknown perimeter, and why is it a security issue?

A

Uncertainty about network boundaries; resources accessible across networks via shared nodes expose systems to uncontrolled malicious users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is an unknown path in network security?

A

Multiple paths exist between hosts; users lack control over packet routes, and insecure hosts (e.g., Host D vs. secure Host C) create vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Who are network attackers, and what motivates them?

A

Motivated by power, money, fame, or intellectual challenge. Most repeat known attacks; few find new flaws.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is CryptoLocker, and how does it operate?

A

Released ~2013, encrypts files using RSA/AES, demands payment for decryption. Spread via fake customer support emails. System Restore may recover files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is hacktivism, and how does it affect networks?

A

Hacking to disrupt normal operations without serious damage, e.g., virtual sit-ins flooding websites to support a cause.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is cyberterrorism, and why is it a concern?

A

Politically motivated hacking to cause grave harm (e.g., loss of life, economic damage). The internet is an increasing attack point.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is port scanning, and what information does it provide?

A

Scans IPs to identify open ports, running services, OS, and application versions, revealing vulnerabilities for potential attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How does social engineering exploit network security?

A

Attackers use social skills (e.g., posing as IT support) to extract internal network information through personal interaction.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is intelligence gathering in network security?

A

Collecting discrete information from sources like dumpster diving, eavesdropping, or forums to prepare for attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is dumpster diving in the context of network attacks?

A

Searching discarded items in trash to find important documents for attack planning.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is OS and application fingerprinting?

A

Identifies OS/applications by analyzing responses to prompts, revealing manufacturer, version, and known vulnerabilities (e.g., via Nmap).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

How do attackers use forums and chats for network attacks?

A

Attackers post/read exploits or use vendor toolkits from forums to gather information for attacks, though reliability is not guaranteed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is wardriving, and what risks does it pose?

A

Searching for open WiFi networks using a computer with a WiFi receiver. Open access points (228,537 reported) often lack encryption, risking sidejacking.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

How do rogue access points threaten network security?

A

Placed in public areas (e.g., coffee shops), they intercept sensitive data. SSL prevents some theft, but passwords/emails remain vulnerable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is eavesdropping in network security?

A

Overhearing communications without effort, potentially legitimate (e.g., admins checking resource use) or malicious.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is the difference between passive and active wiretapping?

A

Passive: Listening to communications.
Active: Injecting into a conversation to manipulate or extract data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
How does wiretapping occur in LANs?
Packet sniffers retrieve packets, or interface cards are reprogrammed to mimic another host’s address, intercepting packets. Rare due to friendly LAN environments.
26
How can cable radiation be exploited for wiretapping?
Attackers use inductance to read radiated signals without physical contact, requiring close proximity to the cable.
27
What is cable splicing in wiretapping?
Joining a secondary cable to receive copies of all signals, allowing interception of LAN communications.
28
Why is wiretapping on WANs more difficult?
Data is heavily multiplexed, requiring attackers to intercept and extract specific communications, making it less common.
29
How are microwave signals vulnerable to interception?
Broadcast over the air, they can be intercepted by interfering with the line of sight or using an antenna off-focus, detectable miles away.
30
Why is wireless traffic interception a significant threat?
Wireless vulnerabilities enable passive/active wiretapping, exacerbated by 85% of users not using encryption or using weak WEP.
31
Describe the telecom security flaw affecting mobile email.
A flaw in a telecom’s CDMA network allowed a second user to view the first user’s email if connected to the same port within 60 seconds due to unterminated WAP sessions.
32
How does encryption protect network communications?
Encrypts LAN/WAN communications to ensure confidentiality. Strong physical/administrative security may be preferred for local LANs.
33
How do protocol flaws create network vulnerabilities?
Despite scrutiny, protocols (identified by RFC numbers) may have issues like client impersonation via sequence number guessing, discovered post-standardization.
34
Why is impersonation a significant network threat?
Easier than wiretapping, especially in WANs, attackers can guess credentials, intercept them, bypass authentication, or target unauthenticated systems.
35
How do attackers exploit weak passwords for impersonation?
Users choose easy-to-guess passwords. Internet worms try username variations, common passwords, or dictionary words to gain access.
36
Why are default passwords a security risk?
Systems/routers often have default accounts (e.g., GUEST, ADMIN) with known passwords (e.g., “guest”), often not disabled by admins.
37
How do dead accounts pose a security risk?
Accounts of former users (e.g., sabbatical professors) remain active, vulnerable to social engineering or password guessing.
38
How do attackers exploit password guessing limits?
Repeated guesses lock accounts, allowing attackers to use social engineering to unlock them via IT departments.
39
How does wiretapping compromise authentication?
Attackers intercept plaintext authentication details from remote host access, reusing them to gain unauthorized access.
40
How do secure protocols prevent authentication vulnerabilities?
Avoid transmitting passwords in plaintext, using cryptographic methods to protect authentication details.
41
Why is the LAN Manager (LM) hash insecure?
Converts passwords to uppercase, pads to 14 characters, splits into two DES keys, producing a 16-byte hash. Limited character set and weak DES make it vulnerable to brute force (cracked in 23 hours in 1998).
42
How do buffer overflow flaws bypass authentication?
Fixed-size password buffers count all input (including backspaces). Overflow bypasses password checks, granting access, especially in WANs.
43
Why is non-existent authentication a vulnerability?
Systems assuming prior authentication (e.g., Unix .rhosts/.rlogin) allow access without re-authentication, trusting primary hosts incorrectly.
44
What are examples of well-known authentication vulnerabilities?
Default BIOS passwords, SNMP community strings, or demo accounts with no passwords allow easy access if not disabled.
45
How does trusted authentication create vulnerabilities?
Delegating identification (e.g., .rhosts) allows remote users access without proper checks, creating potential security holes.
46
What is spoofing in network security?
An attacker falsely carries out one end of a networked interchange, e.g., masquerading, session hijacking, or man-in-the-middle attacks.
47
What is an example of masquerading?
A host pretends to be another (e.g., Amazone.com vs. Amazon.com) to deceive users or systems.
48
How does phishing relate to masquerading?
Fake emails posing as legitimate companies trick users into visiting fraudulent sites or sharing sensitive data. In 2018, 45,771 phishing sites were detected.
49
How do attackers enhance phishing attacks?
Exploit website vulnerabilities to overwrite pages or create fake sites to collect sensitive information or induce real transactions without obvious signs.
50
What is a man-in-the-middle (MITM) attack?
A third party intercepts communication from the start, eavesdropping, decrypting, modifying, and re-encrypting data, unlike session hijacking which occurs post-session.
51
How does session hijacking differ from man-in-the-middle attacks?
Session hijacking occurs after a session is established; MITM involves interception from the start of the session.
52
How is CryptoLocker typically delivered?
Spread via emails to company addresses, disguised as customer support, containing malicious attachments.
53
What are the risks of open WiFi networks?
228,537 open access points, many without encryption or using weak WEP, risk sidejacking and data interception.
54
What is WPA3, and when was it introduced?
WPA3, introduced in 2018, enhances WiFi security to protect against interception and vulnerabilities.
55
Why is SSL critical for network security?
Encrypts communications to prevent interception of sensitive data (e.g., credit cards) on rogue access points, though passwords/emails may still be vulnerable.
56
What is the best defence against attacker reconnaissance?
Silence—avoid sharing any network information to prevent attackers from gathering exploitable data.
57
How can vendor information aid attackers?
Vendors posting toolkits or product details on forums/chats provide attackers with exploitable information or tools to target systems.
58
How does packet sniffing work in LANs?
A sniffer retrieves packets, or a reprogrammed interface card mimics another host’s address to intercept packets, which are then returned to the network.
59
Why are microwave signals a security concern?
Broadcast over the air, they are easily intercepted by interfering with the line of sight or using an offset antenna, enabling long-range monitoring.
60
Why is expert oversight critical for network security cryptography?
Cryptography (e.g., LM hash, DES) requires precise design and monitoring to prevent vulnerabilities like brute force attacks or outdated algorithms.