TM256 B3 Flashcards
(120 cards)
What are the two main types of assets in the context of cybersecurity, and how are they defined?
The two main types of assets are:
* Tangible assets: Anything that can be seen, touched, or experienced in some way (e.g., computer hardware, buildings).
* Intangible assets (or non-tangible): Information, intellectual property (e.g., copyright, trademarks), personnel, and corporate data.
What is the definition of a critical asset?
A critical asset is an asset without which an individual or organisation cannot function.
Provide two examples of tangible assets specifically related to a network within an IT infrastructure.
Two examples of tangible assets related to a network are:
* Network hardware, such as switches, routers, and cabling.
* Security elements, such as firewalls and intrusion detection systems.
Provide two examples of intangible assets in the context of cybersecurity.
Two examples of intangible assets are:
* Data held on servers and in databases.
* Software, such as antivirus protection.
According to the text, what type of asset will be the main focus in relation to devices and equipment within a network and wider IT infrastructure?
Tangible assets will be the main focus in relation to the devices and equipment that exist as part of a network within a wider IT infrastructure.
What are the typical components that form the foundations of a network infrastructure?
The foundations for a network infrastructure typically comprise networking hardware and media (e.g., cables or wireless) that allow communications between different devices, services and protocols, software, and mechanisms for security.
According to VMware, how is the security of a network infrastructure defined?
VMware describes the security of a network infrastructure as ‘a process of protecting the underlying networking infrastructure by installing preventative measures to deny unauthorized access, modification, deletion, and theft of resources and data’ (VMware, 2021).
Why is it helpful to think about network components in hierarchical terms?
Thinking about network components in hierarchical terms helps to understand where each device ‘sits’ within a network, how it connects, what its purpose is, the role of the end user and administrator, and what needs to be defended on a network infrastructure.
What are the three layers of the Cisco hierarchical model, and what is the primary function of each?
The three layers are:
* Access: Provides the entry point onto the network for end-users and devices.
* Distribution: Serves as the conduit between the access layer and the core layer, providing filtering and access to wide area network features.
* Core: Delivers large volumes of traffic between distribution layer devices at the highest speed possible; often referred to as the ‘network backbone’.
What is the purpose of communication reference models like TCP/IP and OSI?
Communication reference models like TCP/IP and OSI help to define the protocols, devices, addressing techniques, and data transmission techniques found within a network infrastructure, and also help in understanding modularity and interoperability.
At which layer of the Cisco three-layer model do most devices critical to the operation and security of a network infrastructure exist?
Most of the devices critical to the operation and security of a network infrastructure exist at the Distribution layer.
What is the main function of a switch, and what are the two general types?
The main function of a switch is to provide an entry point from end-user devices onto a network. The two general types are unmanaged switches (typically for home use) and managed switches (usually found in production environments).
What is MAC flooding, and what can be its consequence?
MAC flooding is when an attacker floods the MAC address table of a switch, which can cause the switch to overload and start acting as a hub, revealing addresses to an attacker.
What are the two general functions performed by routers?
Routers generally perform path determination (building and maintaining a routing table) and packet forwarding (accepting a packet and deciding where to send it based on routing table information).
What is a significant security concern for home users regarding their broadband routers or modems?
A significant security concern is the prospect of manipulation and misdirection of packets into the wrong hands, especially when carrying out activities like internet banking.
Name two vulnerabilities specific to managed switches.
Two vulnerabilities specific to managed switches are:
* MAC address table flooding.
* VLAN manipulation attacks.
Name two vulnerabilities specific to routers.
Two vulnerabilities specific to routers are:
* Attacks on router services (e.g., manipulation of discovery protocols).
* Buffer overflows (e.g., from oversized ICMP echo request packets).
* Manipulation of routing tables.
What did Avast expect to see an increase in, regarding router attacks?
Avast expected to see an increase in attacks where routers were being used for content injection, for example, to send users to compromised banking apps to steal banking credentials.
List three common types of network media and their general vulnerability levels.
- Copper coaxial: High vulnerability (easily tapped).
- Twisted Pair: Medium vulnerability (not as easy to tap, but port security is a concern).
- Fibre-optic: Low vulnerability (difficult to tap).
What is the primary role of a server in a network infrastructure?
What is the primary role of a server in a network infrastructure?
According to Patra, Naveen and Prabhakar (2016), what was the top recommended approach in basic server security?
The top recommended approach was a clearly defined policy for the organisation that ‘must be enforced consistently throughout the organisation to be effective’.
What is considered the biggest overall concern for servers on a network in terms of attacks?
DoS (Denial of Service) attacks are the biggest overall concern for servers on a network.
According to Watson and Jones (2013), what steps must be taken when installing new or upgraded IT cabling?
Watson and Jones (2013) state that: ‘When installing new or upgraded IT cabling, all possible steps must be taken to protect it from physical risks, to protect information from security threats, and to minimise possible risks from environmental hazards.’
What are some other names for a wiring closet?
A wiring closet can also be referred to as a comms room, server room, or network distribution room.