Notes From Lynda Course Flashcards
Port 21
FTP
Port 22
SSH
Port 389
RDP
Ports 137-139
NetBIOS
Port 25
SMTP
Port 110
POP
Port 143
IMAP
Port 80
HTTP
Port 443
HTTPS
Symmetric Algorithms
Encryption and decryption operations use the same key
Asymmetric Algorithms
Encryption and decryption operations use different keys
Salting
Adds a value to the encryption key to make it more complex
Hashing
Adds time to the verification process by requiring more math
WPA
WiFi Protected Access - Uses the Temporal Key Integrity Protocol (TKIP) to implement strong encryption
WPA2
Wifi Protected Access v2 - Adds time to the verification process by requiring more math
LEAP
Lightweight EAP - Insecure protocol that relies upon MS-CHAP
EAP
Broad framework with many variants, some are secure, some are not
PEAP
Protected EAP - Tunnels EAP inside an encrypted TLS session
Spyware
Gathers information
Adware
Displays advertisements
Ransomware
Blocks access
Christmas Tree Attack
Uses packet flags to exploit a system
DNS/ARP Poisoning
Redirects or intercepts traffic
Typosquatting
Exploits typos to get web traffic