Network Security Flashcards
(60 cards)
What is a network in the context of computer security?
A collection of communicating hosts.
What are the key characteristics of a Local Area Network (LAN)?
Covers a small area (e.g., building), connects PCs, printers, file storage; allows data/program/device sharing; locally controlled, physically protected, limited scope (e.g., single department).
What defines a Wide Area Network (WAN)?
Single organizational control, covers large distances, physically exposed.
What are Campus Area Networks (CANs) and Metropolitan Area Networks (MANs)?
CANs connect multiple LANs in a campus; MANs cover a city.
How does anonymity make networks vulnerable?
Attackers can operate remotely, hiding their origin by routing attacks through other hosts, complicating computer-to-computer authentication.
Why do networks have many attack points?
Large networks offer multiple targets and origins; one host may enforce strict security, but remote hosts may not, creating vulnerabilities.
How does resource sharing increase network vulnerability?
More sharing of resources/workload across systems makes single-machine access controls inadequate for network security.
How does system complexity contribute to network vulnerabilities?
Networks combine different OSs/versions, requiring complex control systems. Modern desktops have more power, amplifying attacker capabilities.
What is an unknown perimeter, and why is it a security issue?
Uncertainty about network boundaries; resources accessible across networks via shared nodes expose systems to uncontrolled malicious users.
What is an unknown path in network security?
Multiple paths exist between hosts; users lack control over packet routes, and insecure hosts (e.g., Host D vs. secure Host C) create vulnerabilities.
Who are network attackers, and what motivates them?
Motivated by power, money, fame, or intellectual challenge. Most repeat known attacks; few find new flaws.
What is CryptoLocker, and how does it operate?
Released ~2013, encrypts files using RSA/AES, demands payment for decryption. Spread via fake customer support emails. System Restore may recover files.
What is hacktivism, and how does it affect networks?
Hacking to disrupt normal operations without serious damage, e.g., virtual sit-ins flooding websites to support a cause.
What is cyberterrorism, and why is it a concern?
Politically motivated hacking to cause grave harm (e.g., loss of life, economic damage). The internet is an increasing attack point.
What is port scanning, and what information does it provide?
Scans IPs to identify open ports, running services, OS, and application versions, revealing vulnerabilities for potential attacks.
How does social engineering exploit network security?
Attackers use social skills (e.g., posing as IT support) to extract internal network information through personal interaction.
What is intelligence gathering in network security?
Collecting discrete information from sources like dumpster diving, eavesdropping, or forums to prepare for attacks.
What is dumpster diving in the context of network attacks?
Searching discarded items in trash to find important documents for attack planning.
What is OS and application fingerprinting?
Identifies OS/applications by analyzing responses to prompts, revealing manufacturer, version, and known vulnerabilities (e.g., via Nmap).
How do attackers use forums and chats for network attacks?
Attackers post/read exploits or use vendor toolkits from forums to gather information for attacks, though reliability is not guaranteed.
What is wardriving, and what risks does it pose?
Searching for open WiFi networks using a computer with a WiFi receiver. Open access points (228,537 reported) often lack encryption, risking sidejacking.
How do rogue access points threaten network security?
Placed in public areas (e.g., coffee shops), they intercept sensitive data. SSL prevents some theft, but passwords/emails remain vulnerable.
What is eavesdropping in network security?
Overhearing communications without effort, potentially legitimate (e.g., admins checking resource use) or malicious.
What is the difference between passive and active wiretapping?
Passive: Listening to communications.
Active: Injecting into a conversation to manipulate or extract data.