Shared Flashcard Set

Details

Domain 3 - ISC2
CISSP - Telecom and Network Security (Management Concepts)
106
Computer Science
Professional
07/29/2011

Additional Computer Science Flashcards

 


 

Cards

Term
RAID 7
Definition
(SINGLE VIRTUAL DISK)
-Functions as a single virtual disk
-Usually software over Level 5 hardware
-Enables the drive array to continue to operate if any disk or any path to any disk fails.
Term
Smurf Attack
Definition
(Source Site) Sends spoofed network request to large network (bounce site) all machines respond to the (target site). IP broadcast addressing.
Term
SYN Attack
Definition
-Attacks the buffer space during a Transmission Control Protocol (TCP)
-Attacker floods the target system’s ‘in-process’ queue with connection requests causing the system to time-out.
Term
Storage Media
Definition
-Compact Disk (CD) – permanent backups, longer shelf life than tape
-ZIP – JAZZ – Common
-Tape Array – 32 to 63 Tape Array using RAID technology
HSM – Hierarchical. Provides a continuous on-line backup by using optical or tape ‘jukeboxes’, similar to WORMs.
Term
Types of Tape
Definition
-DAT – Digital Audio Tape
-QIC – Quarter Inch Cartridge – Small and slow
-8mm Tape – Superceded by DLT
-DLT – Digital Linear Tape – 4mm tape – large and fast
Term
FDDI – Fiber Distributed Data Interface
Definition
-Dual rings fault tolerance (if first ring fails, the secondary ring begins working)
-Sometimes uses second ring for improved performance
Term
RAID – Redundant Array of Inexpensive Disks
Definition
-Fault tolerance against server crashes
-Secondary – improve system performance
-Striping – Caching and distributing on multiple disks
-Employs the technique of striping, which involves partitioning each drive's storage space into units ranging from a sector (512 bytes) up to several megabytes. The stripes of all the disks are interleaved and addressed in order.
-Hardware and software implementation
Term
Common DoS Attacks
Definition
-Filling hard drive space with email attachments
-Sending a message that resets a targets host subnet mask causing routing disruption
-Using up all of the target’s resources to accept network connections
Term
Probing
Definition
-Gives an intruder a road map of the network for DoS attack
-Gives a list of available services
-Traffic analysis via ‘sniffers’ which scans the host for available services
-Like a telephone wiretap allows the *FBI to listen in on other people's conversations, a "sniffing" program lets someone listen in on computer conversations.
-Tools: Telnet (manual), vulnerability scanners (automatic).
Term
Server Cluster
Definition
-Group of independent servers managed as a single system
-Load Balancing
-Improves performance
-“Server Farm”
-Microsoft Cluster Server
Term
Computer Emergency Response Team, aka as CIRT
Definition
-Manage the company’s response to events that pose a risk
-Coordinating information
-Mitigating risk, minimize interruptions
-Assembling technical response teams
-Management of logs
Management of resolution
Term
RAID 1
Definition
-Mirroring
-Duplicates data on other disks (usually one to one ratio)
-Expensive (doubles cost of storage)
Term
Teardrop Attack
Definition
-Modifying the length of the fragmentation fields in the IP Packet
-When a machine receives this attack, it is unable to handle the data and can exhibit behavior ranging from a lost Internet connection to the infamous blue screen of death. Becomes confuse and crashes.
Term
Incremental Back Up
Definition
-Only files that have been changed or added recently
-Only files with their archive bit set are backed up.
-This method is fast and uses less tape space but has some inherent vulnerabilities, one being that all incremental backups need to be available and restored from the date of the last full backup to the desired date should a restore be needed.
-Restore = last full backup plus each incremental
Term
Differential back up
Definition
-Only files that have changed since the last backup
-All files to the full backup (additive)
-Restore = full backup plus the last differential
Term
Redundant Servers
Definition
-Primary Server mirrors to secondary server
-Fail-over or rollover to secondary in the event of a failure
-Server fault tolerance can be warm or hot
Term
Failure Resistant Disk Systems Plus(FRDS+)
Definition
-Protect from disk failure – can reconstruct disks by automatically hot swapping while server is running
-Includes environmental
-Adds hazard warnings
Term
Frame Relay
Definition
-Public switched WAN
-Highly Fault Tolerant
-Bad segment diverts packets
-Can use multiple vendors for high availability
Term
Common Backup Problems
Definition
-Slow transfer of data to backup
-Retrieval time to restore
a.Off hour processing and monitoring
b.Server disk space expands over time
-Loss of data between last back up
-Physical security of tapes
Term
Buffer Overflow Attack
Definition
-When a process receives much more data than expected.
-Since buffers are created to contain a finite amount of data, the extra information - which has to go somewhere - can overflow into adjacent buffers, corrupting or overwriting the valid data held in them.
Term
RAID Levels
Definition
0 – Striping
1 – Mirroring
2 – Hamming code parity
3 – Byte level parity
4 – Block level parity
5 – Interleave parity
7 – Single Virtual Disk
Term
Salami Attack
Definition
A series of minor computer crimes that are part of a larger crime.
Term
Spoofing
Definition
An attack that involves nothing more than forging one's source address. It is the act of using one machine to impersonate another. Class E network intrusion
Term
Piggy Backing
Definition
Attack using another users connection. Class E network intrusion
Term
Back Door
Definition
Attack via dial up or external connection. Class E network intrusion
Term
RAID 3
Definition
BYTE LEVEL PARITY) RAID 4 (BLOCK LEVEL PARITY)
-RAID 3 – Byte level
-RAID 4 – Block level
-Stripe across multiple drives
-Parity information on a parity drive
-Provides redundancy
-Can affect performance with single parity drive
Term
Full Back Up
Definition
Backup every file
Term
CIRT – Computer Incident Response Team
Definition
CIRT performs
Analysis of event
Response to incident
Escalation path procedures
Resolution – post implementation follow up
Term
Twisted Pair
Definition
Cable length is a common failure. The difference between the two has to do with the tightness the copper wires are wound. Tightness determines its resistance to interference. CAT3 is older.
Term
Classes of Network Abuse
Definition
Class A – unauthorized access through circumvention of security access controls.
Class B – non-business use of systems
Class C – Eavesdropping
Class D – Denial of Service Saturation of network services
Class E – Network Intrusion – penetration (externally)
Class F – Probing
Term
Network Based IDS
Definition
Commonly reside on a discrete network segment and monitor the traffic on that network segment.
Term
C2
Definition
Controlled Access protection
Term
Passive Eavesdropping
Definition
Covertly monitoring or listening to transmissions that is unauthorized. CLass C network abuse
Term
C1
Definition
Discretionary Security Protection
Term
C
Definition
Discretionary protection
Term
Trivial File Transfer Protocol (TFTP
Definition
Good tool for router configuration
Term
RAID 2
Definition
HAMMING CODE PARITY)
-Multiple disks
-Parity information created using a hamming code
-Can be used in 39 disk array 32 Data and 7 recovery
-Not used, replaced by more flexible levels
Term
Protocol field has a value of 1
Definition
ICMP
Term
Protocol field has a value of 2
Definition
IGMP
Term
RAID 5
Definition
INTERLEAVE PARITY)
-Most popular
-Stripes data and parity information across all drives
-Uses interleave parity
-Reads and writes performed concurrently
-Usually 3-5 drives. If one drive fails, can reconstruct the failed drive by using the information from the other 2.
Term
Network Interface Card (NIC)
Definition
If set at wrong speed or in error state can bring the network down.
Term
Fiber Optic
Definition
Immune to EMI. Longer usable length (upto 2kms). Drawback is costs.
Term
PING of Death
Definition
Intruder sends a PING that consists of an illegally modified and very large IP datagram, thus overfilling the system buffers and causing the system to reboot or hang.
Term
IP Spoofing
Definition
Is used to convince a system that it is communicating with a known entity that gives an intruder access. IP spoofing involves altering the packet at the TCP level. The attacker sends a packet with an IP source address of a known, trusted source. E-mail spoofing is the forgery of an e-mail header so that the message appears to have originated from someone or somewhere other than the actual source.
Term
B1
Definition
Labeled Security
Term
B
Definition
Mandatory
Term
Coaxial cable
Definition
Many workstations or servers attached to the same segment of cable, which creates a single point of failure if it is broken (similar to cable TV cabling). Exceeding cable length is a source of failure.
Term
D
Definition
Minimal protection
Term
Ethernet
Definition
Most popular; extremely resistance to failure, especially in a star-wired config
Term
Remote Node Authentication
Definition
PAP – Password Authentication Protocol – clear text
CHAP – Challenge Handshake Authentication Protocol – protects password
Term
PING
Definition
Packet Internet Groper – uses ICMP – Internet Control Message Protocol, it is used some times in a Buffer Overflow attack
Term
Failure Resistant Disk Systems (FRDS)
Definition
Provides the ability to reconstruct the contents of a failed disk onto a replacement disk
Term
Remote Access Authentication
Definition
RADIUS – Remote Access Dial-In User Server
TACACS – Terminal Access Controller Access Control Server
Term
Tapping
Definition
Refers to the physical interception of a transmission medium (like splicing of cable). Class C network abuse
Term
B3
Definition
Security Domains
Term
Knowledge Based IDS
Definition
Signature based
Pros - Low False Alarms
Alarms Standardized
Cons- Resource Intensive
New or unique attacks not found
Term
Behavioral Based IDS
Definition
Statistical Anomaly
Pros - Dynamically adapts
Not as operating system specific
Cons - High False Alarm rates
User activity may not be static enough to implement
Term
B2
Definition
Structured
Term
Leased Lines
Definition
T1 and ISDN – go with multiple vendors to reduce failures
Term
Protocol field has a value of 6
Definition
TCP
Term
Active Eavessdropping
Definition
Tampering with a transmission to create a covert signaling channel or probing the network. Class C network abuse.
Term
Fraggle Attack
Definition
The "smurf" attack's cousin, uses UDP echo packets in the same fashion as the ICMP echo packet.
Term
Token Ring
Definition
Token is passed by every station on the ring, can be a single point of failure.
Term
TCP Sequence number
Definition
Tricks the target in believing that it’s connected to a trusted host and then hijacks the session by predicting the target’s choice of an initial TCP Sequence number. Then it’s used to launch various other attacks on other hosts.
Term
Protocol field has a value of 17
Definition
UDP
Term
Host Based IDS
Definition
Use small programs, which reside on a host computer. Detect inappropriate activity only on the host computer, not the network segment.
Term
Covert Channel
Definition
Using a hidden unauthorized communication. Class C network abuse
Term
Securing External Remote Connections
Definition
VPN – Virtual Private Network
SSL – Secure Socket Layer
SSH – Secure Shell
Term
Remote Connections
Definition
xDSL – Digital Subscriber Line
Cable modem
Wireless (PDAs)
ISDN – Integrated Services Digital Network
Term
EAL 1
Definition
Functionally Tested - provides an evaluation of the TOE (Target of Evaluation) as made available to the customer, including independent testing against a specification, and an examination of the guidance documentation provided
Term
EAL2
Definition
Structurally Tested - requires the cooperation of the developer in terms of the delivery of design information and test results, but should not demand more effort on the part of the developer than is consistent with good commercial practice
Term
EAL3
Definition
Methodically Tested and Checked - permits a conscientious developer to gain maximum assurance from positive security engineering at the design stage without substantial alteration of existing sound development practices.
Term
EAL4
Definition
Methodically Designed, Tested, and Reviewed - permits a developer to gain maximum assurance from positive security engineering based on good commercial development practices which, though rigorous, do not require substantial specialist knowledge, skills, and other resources.
Term
EAL5
Definition
Semiformally Designed and Tested - permits a developer to gain maximum assurance from security engineering based upon rigorous commercial development practices supported by moderate application of specialist security engineering techniques.
Term
EAL6
Definition
Semiformally Verified Design and Tested - permits developers to gain high assurance from application of security engineering techniques to a rigorous development environment in order to produce a premium TOE for protecting high value assets against significant risks
Term
EAL7
Definition
Formally Verified Design and Tested - applicable to the development of security TOEs for application in extremely high risk situations and/or where the high value of the assets justifies the higher costs.
Term
Layerd Security Approach
Definition
Computer security is most effective when multiple layers of security are used:
1) Security Policies, procedures, standards and guidelines
2)Permimeter security including routers and firewalls
3)Hardware/Sofware host security productes
4)Auditing, monitoring, IDS and response
Term
Session Hijacking Attacks
Definition
-IP Spoofing
-C2MYAZZ
-TCP Sequence Number Attacks
-DNS Poisoning
Term
Dial-Up Attacks
Definition
-War dialing
-Demon dialing
-Toneloc
Term
Vulnerability Scanning
Definition
Periodic scans to identify weaknessess
-Discovery Scanning
-Workstation Scanning
-Server Scanning
Term
Scanning Tools
Definition
-Computer Oracale and Password Systems (COPS)
-HPing and HPing2
-Legion
-Nessus
-NMap
-Remote Access e Scanner (RAPS)
-Security Administrator Integrated Tool (SAINT)
-System Administrator Tool for Analyzing Networks (SATAN)
-TCPView
-Snort
Term
Port Scanning
Definition
Process of sending data packets to a port to gather information about the state of that port
-ICMP scanning
-TCP or UDP scanning
-DNS queries
-O/S identification and testing
-Application identification and testing
Term
Port 20/21
Definition
File Transfer Protocol (FTP)
Term
Port 23
Definition
Telnet
Term
Port 25
Definition
SMTP
Term
Port 109
Definition
POP2
Term
Port 110
Definition
POP3
Term
Port 143
Definition
IMAP
Term
Port 53
Definition
Domain Name Service
Term
Port 80/8000/8080
Definition
HTTP
Term
Port 135
Definition
NETBOIS-NS
Term
Port 137
Definition
NETBIOS-DGM
Term
Port 138
Definition
NETBIOS
Term
Port 161
Definition
Simple Network Management Protocol
Term
Port 2049
Definition
Networking File System
Term
Issues with Vulnerability Scanning
Definition
-False Positive
-Heavy Traffic
-False negatives
-System crash
-Unregistered port numbers
Term
Phishing
Definition
Term describing exploits used to commit identify theft via
- social engineering through email and brand spoofing
-infected web sites and cookies
-torjan horses and spyware
-browswer hijacking and redirection
-keyloggers and spybots
Term
Browser Hijacking
Definition
Change web browser settings to switch home pages or hijack search functions
Term
8.3 Naming Conventions
Definition
Web servers that repond to requests for their DOS 8.3 file name are vulnerable to attacks.
Term
Types of Spyware
Definition
-Adware
-Keyloggers
-Web Bugs
-Spambots
-Pop-up
-Drive-by
-Bogus spyware removal programs
-multistage and blended threats
Term
Worm
Definition
Malicious self-replicating computer program designed to infect multiple remote computers in attempt to deliver a destructive payload
Term
logic bomb
Definition
Malicious code added to an existing application to be executed at a later date
Term
Trojan Horses
Definition
A program in which malicious or harmful code is contained inside apparently harmless programming or data
Term
Common Trojans
Definition
-Tinoo
-Back Office
-NetBus
-Bagle
-Hearse
-SubSeven
Term
Stealth Viruses
Definition
Attempt to hide from the O/S and Anitvirus software by changing their size, date, or encrypting themselves
Term
Polymorphic viruses
Definition
-Difficult to detect as they change with each infection
-3 main parts:
1 Scrambled Virus body
2 Decryption routine
3 Mutation engine
Supporting users have an ad free experience!