Network Security Concepts Flashcards

(47 cards)

1
Q

CIA Triad

A
  1. Confidentiality: Ensures only authorized individuals can access information.
  2. Integrity: ensures data is not altered and is accurate.
  3. Availability: Ensures authorized users can access information and systems.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Checksum

A

A checksum is a small piece of data—usually a number—that is generated from a larger set of data (like a file or message) using a mathematical algorithm. It’s used to detect errors in data, especially during transmission or storage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Data Sovereignty

A

A country’s right to control data within its borders.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Mission Essential Functions (MEFs)

A

Tasks the business must perform, and it is too critical to be deferred.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Business Impact Analysis (BIA)

A

Estimates the cost of disruptions (e.g., from a DoS attack)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Data locality

A

Ensures data is stored and processed only in specific geographic regions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Payment Card Industry Data Security Standard (PCI DSS)

A

The information security standard for organizations that process credit or bank card payments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

General Data Protection Regulation (GDPR)

A

Provisions and requirements protecting the personal data of European Union (EU) citizens.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Encryption Algorithm

A

Scrambling the characters used in a message so that the message can be seen but not understood or modified unless it can be deciphered.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Exploit

A
  • The method or code used to take advantage of a vulnerability.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

0 Day Vulnerability

A

Vulnerability in software that is unpatched by the developer or an attack that exploits such a vulnerability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Vulnerability Assessment

A

Evaluation of a system’s security and ability to meet compliance requirements based on the configuration state of the system, as represented by information collected from the system. Also called vulnerability testing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Honeypot/Honeynet

A

Honeypots and honeynets are cybersecurity tools used to detect, mislead, and analyze attackers by creating fake systems that appear real.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Threat Research

A

A counterintelligence gathering effort in which security companies and researchers attempt to discover the tactics, techniques, and procedures (TTPs) of threat actors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Three Types of Threat Research

A
  1. Behavioral threat research—Narrative commentary describing examples of attacks and TTPs gathered through primary research sources.
  2. Reputational threat intelligence—Lists of IP addresses and domains associated with malicious behavior, plus signatures of known file-based malware.
  3. Threat data—Computer data that can correlate events observed on a customer’s own networks and logs with known TTP and threat actor indicators.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Footprinting

A

Footprinting allows a threat actor to discover the topology and general configuration of the network and security systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Fingeprinting

A

Fingerprinting allows a threat actor to identify device and OS types and versions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Phishing

A

A fraudulent attempt to get users to click a malicious link or open an attachment by pretending to be a trustworthy entity (like a bank or employer).
Usually delivered through:

Email (most common)

Text message (smishing)

Phone calls (vishing)

Fake websites

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Pharming

A

A more technical attack that redirects users to a fake website, even if they type the correct URL.
How it works:
DNS poisoning: Attacker corrupts the DNS server or local DNS cache, so when you try to visit a real website, you’re silently redirected to a malicious clone.

Hosts file modification: The attacker changes your computer’s configuration to redirect traffic.

20
Q

Denial of Service (DoS) Attack

A

Attack causes a service at a given host to fail or to become unavailable to legitimate users.

21
Q

Distributed Denial of Service

A

An attack launched by multiple systems simultaneously to flood a target network or system.

22
Q

Distributed Reflection DoS

A

An enhanced DDoS attack that uses third-party servers to reflect and amplify traffic back to the victim.
- Attacker spoofs the victim’s IP address in requests to legitimate servers.
- Those servers respond to the victim, thinking the requests are real.
- The response is often much larger than the original request (amplification).

23
Q

Fileless Malware

A

Uses lightweight shellcode that resides in memory. Often initiated via scripts, malicious attachments, or Trojans.

24
Q

Common behavior and technics of Fileless Malware

A
  1. Doesn’t write its code on disk. The malware uses memory-reside techniques to run its own process.
  2. It uses lightweight Shellcode to achieve a backdoor mechanism on the host.
  3. Fileless malware may use “live off the land” techniques rather than compiled techniques which means the malware uses legitimate system scripting tools like PowerShell and Windows Management Instrument.
25
Advanced Persistent Threat (APT)
APT is a long-term, stealthy cyberattack where attackers infiltrate a network and remain undetected for months or years. Long-term, stealthy infiltration, often state sponsored.
26
Advanced Volatile Threat (AVT)
AVT is similar to APT but focuses on volatile (in-memory) attack methods that leave little to no trace on disk.
27
Low Observable Charactristics
LOC attacks focus on being invisible or very hard to detect by mimicking normal system behavior.
28
On Path Attack
The attacker sits between two hosts and intercepts or alters traffic without either host knowing.
29
MAC and IP Spoofing
A host can arbitrarily select any MAC and/or IP address and attempt to use it on the network. While each network interface has a burned-in MAC address, this can be changed to any arbitrary value using packet crafting software. A threat actor might exploit this to spoof the value of a valid MAC or IP address to try to circumvent an access control list or impersonate a legitimate server. For this type of attack to succeed, the threat actor must normally disable the legitimate host or there will be duplicate addresses on the network, which will have unpredictable results.
30
ARP spoofing/Poisoning
- ARP (Address Resolution Protocol) is insecure and trust-based. - Attackers send fake ARP replies (gratuitous ARP) with spoofed MAC/IP addresses. - Victim devices update their ARP caches, trusting the spoofed information. - Often targets the default gateway, so traffic is misrouted through the attacker.
31
Nmap
Nmap (short for Network Mapper) is a free, open-source tool used for network discovery, security auditing, and troubleshooting. It's one of the most widely used tools by system administrators, penetration testers, and cybersecurity professionals.
32
MAC Flooding
An attack in which the switch is bombarded with fake MAC addresses.
33
MAC Spoofing
The attacker tries to change the original MAC address of a network interface.
34
VLAN Hopping Attack
Exploiting a misconfiguration to direct traffic to a different VLAN without authorization.
35
Double-Tagging Attack
- The attacker puts two VLAN tags on the data packet. - The first switch removes the outer tag (thinking it’s on the correct VLAN). - The inner tag is then read by the next switch, which sends the packet into a different VLAN.
36
Switch Spoofing
- The attacker makes their computer pretend to be a switch. - They use trunking protocols (like DTP or 802.1Q) to make the real switch think it's connecting to another switch. - Once this happens, the attacker receives traffic from all VLANs that the switch sends over the trunk link.
37
STP Manipulation
- STP prevents network loops by choosing a “root bridge” switch to control traffic paths. - An attacker can plug in a fake switch and trick the network into thinking their device is the root bridge. - Once they become the root, network traffic flows through their device. - This lets them intercept and capture a lot of sensitive data using a packet sniffer.
38
Rogue Device/Service
A rogue device or service is any device or application that connects to a network without the knowledge or approval of IT staff.
39
Shadow IT
Computer hardware, software, or services used on a private network without authorization from the system owner.
40
Rogue DHCP Server
A rogue DHCP server is an unauthorized device providing IP leases. - Can be created accidentally (e.g., leaving DHCP enabled on a router or access point). - Can be used maliciously to: - Assign fake default gateways or DNS servers - Intercept or redirect traffic through the attacker’s machine (on-path attack) - Cause clients to lose connectivity or access the wrong network resources
41
DHCP Starvation Attack
A DHCP starvation attack floods the legitimate DHCP server with fake requests, quickly exhausting its IP address pool.
42
Typosquatting
Malicious sites mimicking real ones using common typos like "gogle.com"
43
DNS Hijacking/Poisoning
Attack where a threat actor injects false resource records into a client or server cache to redirect a domain name to an IP address of the attacker's choosing.
44
DNS-Based On-Path Attacks
Attacker must be one the same LAN as the victim. Attacker can use ARP poisoning to respond to DNS queries from the victim with spoofed replies. A rogue DHCP could be used to configure clients with the address of a DNS resolver controlled by the threat actor.
45
DNS Client Cache Poisoning
DNS Client Cache Poisoning is a type of DNS poisoning attack that specifically targets the DNS cache on a user's local machine (client) instead of a DNS server. The goal is the same: redirect the user to a malicious site by corrupting the domain name resolution process. Windows:`%SystemRoot%\System32\Drivers\etc\hosts`. Linux/Unix: `/etc/hosts`.
46
DNS Server Cache Poisoning
DNS Server Cache Poisoning (also called DNS spoofing) is when an attacker injects false DNS records into a DNS server’s cache. This causes many users who rely on that DNS server to be redirected to malicious websites, even if they type in the correct domain.
47