Shared Flashcard Set

Details

CIS 4361: Applied Security
Final Exam
83
Computer Science
Undergraduate 3
05/01/2014

Additional Computer Science Flashcards

 


 

Cards

Term
What do firewalls do with packets?
Definition
Examines each packet passing through making sure its not a provable attack.
Term
Internal firewalls
Definition
Filters traffic passing between different parts of the site's internal network.
Term
Ingress filtering.
Definition
Firewall examines packets entering the network from the outside.
Term
Egress filtering
Definition
The firewal filters packets when they are leaving the network.
Term
What does it mean that a firewall should operate at wire speed?
Definition
Firewalls must have the capacity to handle the incoming traffic volume with heavy attacks.
Term
Border firewall
Definition
Sits at the boundary between the corporate site and the external Internet.
Term
Wire speed
Definition
The maximum speed of data coming into each port.
Term
Stateful Packet Inspection (SPI)
Definition
Firewall filtering mechanism that nearly all main border firewalls use as their primary inspection mechanism.
Term
Which port number is well-known for "Port 80?"
Definition
HTTP
Term
Which port number is well-known for "Port 20/21?"
Definition
FTP Data Traffic
Term
Which port number is well-known for "Port 22?"
Definition
Secure Shell
Term
Which port number is well-known for "Port 25?"
Definition
Simple Mail Transfer Protocol (SMTP)
Term
Which port number is well-known for "Port 53?"
Definition
Domain Name System (DNS)
Term
Intrusion Detection Systems (IDSs)
Definition
Examines streams of packets to look for suspicious activities that indicate possible attacks. Similar to a car or house alarm once the IDS suspects suspicious movement in progress it'll send an alarm message to the security adminstrator.
Term
Intrusion Prevention Systems (IPSs)
Definition
Use IDS filtering mechanisms and allowed to stop traffic at the high end of the attack confidence spectrum.
Term
Access Control Lists
Definition
Series of a rules that are exceptions to the default behavior.
Term
Ingress ACLs
Definition
ACLs internally initiate connection-opening attempts specify conditions under which it should be prevented.
Term
Egress ACLs
Definition
ACLs externally initiate connection-opening attempts specify conditions under which certain attempts should be accepted.
Term
What is a state?
Definition
A period, phase, or stage in a connection. A distinct phase in a connection between two applications.
Term
What is a connection?
Definition
Persistent conversations between different computers.
Term
How is a connection represented?
Definition
It's used like a telephone in a conversation between two people.
Term
Why are stateful packets inspections firewalls inexpensive?
Definition
Simple for packets that do not attempt to open a connection. Consequently, nearly all are handled quickly.
Term
Network Address Translation (NAT)
Definition
Used in firewalls that use various types of examination methods as a second type of protection.
Term
Translation Table
Definition
Consist of the NAT firewall and places the internal socket and the external socket in the table.
Term
NAT Benefits
Definition
Translate network IP addresses and port numbers.
Term
Application firewalls
Definition
Provides automatic protection offered by application proxy firewalls unlike the SPI. Hides the internal IP addresses, header destruction, and protocol fidelity.
Term
The Demilitarized Zone
Definition
A subnet that contains all of the servers and application proxy firewalls that must be accessible to the outside world.
Term
What are sniffers?
Definition
A source that captures packets and notes the IP address that allows attackers to learn about the network's host IP address and have access to their port numbers without sending a probe packets.
Term
Characteristics of sniffers
Definition
Ability to send attacks packets to the available IP adresses and port numbers.
Term
Why are deep packet inspections important?
Definition
Examines all fields of the packet, including the IP header, the TCP/UDP header, and the application message.
Term
Packet Stream Analysis
Definition
Instead of just individual packets for dangerous pattenrs is very processing-intensive.
Term
Why do half open (SYN flooding) DoS attacks cause problems for servers?
Definition
The packets have the same format as the legitimate packets.
Term
What can be done to to stop half-open DoS attacks?
Definition
Companies that own infected computers must stop their computers from sending out DoS attack packets.
Term
Three hosts thst are usually placed in DMZ?
Definition
Public webservers, Application Proxy Servers, and a DNS server that only knows the host names and IP addreses within DMZ.
Term
Why is vulnerability testing necessary?
Definition
To detect if the ACL rules are intact due to the complexity of writing each rule and to make sure all the rules went through during the installation process.
Term
Log Files.
Definition
Contains selected data from each packets that was dropped
Term
How can attackers avoid the border firewall?
Definition
Avoid the firewall filtering completely. Work with someone that's already apart of the network. Attack and compromise an internal computer. Allow drive-by hackers to enter the site with an access point. Compromise the users personal devices when they connect to the network with their tablets and phone and other devices.
Term
Zero-Day Attack
Definition
A new attack that are made before signatures are defined.
Term
What is access control?
Definition
The policy-driven control of access to systems, data, and dialogues.
Term
Authentication
Definition
The process of assessing the identity of each individual claiming to have permission to use a resource.
Term
Authorization
Definition
Specific permissions that a particular authenticated user should have, given his or her authenticated identity.
Term
Auditing
Definition
Collecting information about an individual's activities in log files.
Term
Four bases of authentication credentials
Definition
What you know (a pasword or private key), What you have(a physical key or a smart card), Who you are(your fingerprint), What you do(how you specifically pronounce a passphrase)
Term
Two factor of authentication
Definition
Using two credentials in order to gain to private information such as a verbal voice recognition and an active smart card key to scan with pin.
Term
Role-Based Access Control (RBAC) and its benefits
Definition
Cheaper and less error-prone than basing access rules on individual accounts
Term
ISO/IEC 27002's Security Clause 9
Definition
Physical and environmental security: securing offices, rooms, and facilities.
Term
Controls for equipment disposals/reuse and offsite equipment maintenance.
Definition
Only authorized people are allowed access to the equipment. The equipment must be logged off and logged back in with the users' specification.
Term
Piggybacking
Definition
Enforcing entrance controls is very dificult because of a social engineering trick.
Term
What is dumpster diving?
Definition
An attacker goes through a firm's trash bins looking for documents, backup tapes, floppy disks, and other information-carrying media.
Term
Reuseable passwords
Definition
Passwords used for weeks and/or months at a time.
Term
One-time passwords
Definition
Passwords is only used once.
Term
Why is password cracking over a network difficult?
Definition
Once you try to log in and repeatedly use the wrong information the account will lock itself and it'll frustrate attackers that try to attempt to hack the account.
Term
What is brute-force password guessing?
Definition
Try to decipher the password using the 26 alphabetic characters, or 52 upper and lower case letters, or 62 alphanumeric characters, or using all 75 characters available on a modern keyboard.
Term
What is a dictionary attack?
Definition
Depicting of random passwords that are commonly used.
Term
Ideal password advice
Definition
The longer the password increases the difficulty for hackers to break and figure out your passwords.
Term
Magnetic Strip Card
Definition
Authentication cards that contain data on a magnetic stripe.
Term
Smart card
Definition
Authentication card that contains a microprocessor.
Term
What is the attraction of proximity tokens?
Definition
By simply walking up to the computer or door you'll be granted access after you authorize your information into the system.
Term
What is a personal indentification number (PIN)?
Definition
Passwords that are used with physical access devices that are usually four to six digits long.
Term
What is biometric authentication?
Definition
Based on something you are or something you do. Make reusable passwords obsolete.
Term
What is false acceptance?
Definition
A match to a template that should not be made.
Term
What is false rejection?
Definition
The supplicant is incorrectly rejected as a match to a template when the applicant should be accepted as a match.
Term
Which is worst false acceptance or rejection?
Definition
Depending on the content they both aren't good, but overall false rejection is a major security violation.
Term
What is failure to enroll?
Definition
A type of error that occurs when the system doesn't enrolla user.
Term
Verification
Definition
A supplicant claims to be a particular person, and the challenge is to measure the supplicant's biometric access data against the template of the person he or she claims to be.
Term
Identification
Definition
The supplicant doesn't claim to be a particular person in contrast.
Term
What will be the FAR for verification?
Definition
One in a thousand, 0.1 percent.
Term
What will be the FAR for identification?
Definition
1/1,000 * 500
Term
What is the principle of least permissions?
Definition
Each person should only get the permissions that he or she absolutely needs to do his or her job.
Term
What is auditing?
Definition
Records and analyzes what the person or program actually did.
Term
What is Death of the perimeter?
Definition
A phrase used by network administrators to convey the idea that creating a 100 percent secure network is impossible.
Term
The purpose for DoS attacks
Definition
To cause harm, in regards to to corporations this can comein the form of losses related to online sales, industry reputation, employee productivity, or customer loyalty.
Term
Direct DoS attacks
Definition
Flooding the victim directly.
Term
Indirect DoS attack
Definition
Spoofing the source address and then flood the victim.
Term
Intermediary DoS attack
Definition
Handler can update the software to change the type attack the bot can do, Peer-to-peer redirect.
Term
Reflected DoS attack
Definition
Incorrectly configured router, Broadcasts to internal hosts.
Term
Malformed Packets
Definition
Causes a victim to crash, Ping of death, SMS of death.
Term
Flooding
Definition
Direct or indirect attacks can only succeed if the attacker can flood the victim with more requests than the victim can handle.
Term
Spoofing
Definition
Attackers don't like to send direct attacks, therefore they use spoofed IP addresses that hide their original IP address from being visible.
Term
Backscatter
Definition
When a victim sends responses to the spoofed IP address used by the attacker, and inadvertently floods an unintended victim.
Term
SYN Flooding
Definition
A victim is flooded with SYN packets in an attempt to make many half-open TCP connections.
Term
Ping Flooding
Definition
A victim is flooded with ICMP packets that appear to be normal supervisory traffic.
Term
Defending DoS attacks
Definition
Black Holing, Validating the Handshake, Rate Limiting
Supporting users have an ad free experience!