Shared Flashcard Set

Details

ITEC 285 Security Midterm
How many Ambien for you guys to leave me alone?
60
Computer Networking
12th Grade
02/23/2022

Additional Computer Networking Flashcards

 


 

Cards

Term
Data Privacy and Confidentiality
Definition
Ensure data has not been copied or read by parties who do not have permission.
Term
Data Integrity
Definition
Data integrity involves ensuring that data deleted or tampered.
Term
Access Control
Definition
Controlling who can do what, and when on your system.
Term
System logging and auditing
Definition
Capturing of all potentially relevant data. Often followed by auditing: evaluating all potentially relevant data.
Term
Availability
Definition
Involves making sure data or computing resources are available to authorized users when needed.
Term
What does C.I.A stand for?
Definition
Confidentiality

Integrity

Availability
Term
The Script Kiddie
Definition
Uses widely available security tools
Messes with people
Attempting to learn
Low risk attackers
Term
Part Time Hackers
Definition
Often curious

Involved in computers or tech.

Can be just as dangerous to themselves as others

Don't cause much damage on purpose
Term
Criminals/Vigilante
Definition
Most dangerous group of attackers

Specific targets in mind

Often very focused, research a target

Criminals, motivated by personal gain. They may want to engage in identity or credit card theft, etc.
Term
The insider
Definition
Considered the most dangerous threat to an organization.

Already inside the firewall

Many start by just nosing around

May be motivated by greed, revenge, etc.
Term
White vs Black
Definition
White hat hackers have authorization, black hat hackers do.
Term
Unauthorized Access
Definition
People who should not be able to connect to your system resources are able to connect and do so.
Term
Exploration of Known Weaknesses
Definition
Some services that are internet accessible, and were not designed with security in mind allow a threat actor to exploit known bugs to run arbitrary code.
Term
Denial of Service
Definition
Sending traffic to a network host that is designed to crash a component of the host or use up all available resources.
Term
Spoofing
Definition
This involves sending packets that try and trick a host into thinking you are another trusted computer.
Term
Eavesdropping
Definition
This involves an attacker gaining access to data in network traffic they should not be able to access.
Term
Social Engineering
Definition
The largest weak point in many organizations. This involves an attacker tricking people into giving away sensitive information.
Term
Anti-Virus
Definition
Computer programs designed to prevent, detect, and defend against malware.
Term
APT
Definition
In computer security terms, an Advanced Persistent Threat. This is a threat actor who gains unauthorized access to a computer network and remains undetected for an extended period. Usually when people talk about APT's they are referring to sophisticated groups, often affiliated with a nation-state.
Term
Backdoor
Definition
a hardware or software method that is used to gain easy access to a system. Often, when people discuss back doors, they are referring to software a threat actor will install after the initial compromise to get easy access to the system later. In some cases, back doors may be left on new devices or software by malicious or incompetent vendors.
Term
Botnets
Definition
A combination of “Robot” and “Network”. A botnet is a group of devices that are controlled centrally. Usually, botnets on the internet are large numbers of devices that have been successfully attacked and are now used for purposes such as Distributed Denial of Service Attacks, sending spam, or finding other victims.
Term
C2 Servers
Definition
Short for “Command and Control” Servers. These are servers that threat actors place somewhere on the internet to control and communicate with hacked systems. They are most often used by botnets.
Term
Cipher
Definition
An algorithm for encrypting and/or decryption data.
Term
Malware
Definition
Blanket term for Malicious Software. Malware could be a virus, adware, ransomware, key loggers, back doors, or other types of malicious software.
Term
SIEM
Definition
: Security Information and Event Management. A SIEM typically gives IT or security staff the ability to centrally collect security data from multiple systems and present that as actionable information via a single interface.
Term
Threat Actor
Definition
An entity responsible for an event or incident that may impact the safety or security of another entity. Usually, this term is used to describe an individual or group that attempts to perform malicious acts against other organizations. I often use the term ‘Attacker’ interchangeably with Threat Actor, and I’ve also seen ‘bad actor’ or ‘hostile actor’ or ‘malicious actor’.
Term
VPN
Definition
Virtual Private Network. A VPN allows user to create a private network, to send or receive data, across a public or untrusted network. Generally, all the data that travels across a VPN is encrypted in such a manner that only the sender and receiver can view it. Different types of VPNs may be used by remote workers, organizations to secure traffic between physical locations, or by privacy conscious individuals who want to either obscure their traffic or make it seem like it is coming from a different location.
Term
Stenography
Definition
Hiding the existence of a message
Term
What was Caesar's contribution to crypto?
Definition
Invented the Caesars cipher, a trans positional cipher that shifts letters 3 spaces.
Term
Transposition
Definition
Involves changing the order of letters in a cipher.
Term
One Time Pad
Definition
Using a Viginere's Square with a random key as long as the message
Term
Modular Arithmetic
Definition
Deals with a set of numbers in a loop.
Term
Who handles domain disputes in Canada?
Definition
ICANN (Internet Corporation for Assigned Names and Numbers)
Term
What is Net Neutrality?
Definition
ISP's cannot unjustly discriminate or prefer certain types of traffic.
Term
Can Canadian ISP's block lawful content?
Definition
NO
Term
How much can an individual be charged per court case in Canada?
Definition
$5000
Term
4 Purposes of firewalls
Definition
Choke point for security reasons

Enforce security policies

Log activity

Keep Intrusions from spreading
Term
Packet Filtering (Firewalls)
Definition
Filter packets by protocol (TCP/UDP), source/destination address, and source/destination port. Most basic type of firewalls.
Term
Stateful Inspection (Firewalls)
Definition
Outgoing traffic is analyzed and placed in a table. When the traffic returns the state table is checked to ensure the arriving traffic was solicited from inside the firewall.
Term
Application Gateways (Firewalls)
Definition
Implement security at OSI layer 7. Most advanced firewalls, make decisions based on packet data rather than headers.
Term
Proxy Firewall
Definition
Not really a firewall. Get data on behalf of a client, and return it to the client when its received.
Term
Traffic Shaping
Definition
Control network throughput in various ways: give certain packets higher priority/bandwidth, slow down other services that are not time sensitive, etc.
Term
Traffic Accounting
Definition
Gather and display information about network traffic over a period of time. Often can be filtered by interface, protocol, port, IP, etc.
Term
Accept (Firewall)
Definition
Allows the packet to pass as if the firewall didn't exist.
Term
Reject
Definition
Does not allow the packet through. Sends a response to the client.
Term
Discard
Definition
Simply discards the packet, does not reply to the client.
Term
Red Zone
Definition
A hostile, insecure network.
Term
Orange Zone
Definition
A DMZ. Demilitarized zone. Isolated area on a network with machines that need to talk to the outside world. Can be reached by the private or public network but cannot reach back into the private network.
Term
Blue Zone
Definition
A wireless network. Often isolated from the Green zone.
Term
Un-Encrypted web traffic is refereed to as:
Definition
Hypertext Transfer Protocol
port 80 by default
Term
Encrypted Web Traffic is refereed to as:
Definition
HTTPS HTTP Secure
port 443 by default
Term
In TLS communications who initiates communication?
Definition
The client
Term
What are the steps of establishing a TLS Connection?
Definition
1. Client Hello - Offer supported versions of TLS, Ciphers, etc.

2. Server Hello - Chooses TLS version, cipher, etc. Server sends its certificate.

3. Client Key Exchange - Secret PreMasterKey encrypted using servers public key

3. Server de-crypts messages using preciously exchanged keys

4. Client de-crypts messages using previously exchanged keys.
Term
Forward Secrecy
Definition
Ensures a compromised server wont allow attackers to de-crypt previously captured traffic. (New keys are generated each time communication is negotiated.)
Term
Certificate Authority
Definition
An entity that issues and verifies digital certificates.
Term
Domain Validation (Certificate Authority)
Definition
A domain validation shows that you actually own a domain. It does not confirm the validity of an organization.
Term
Organization Validation
Definition
Shows that you own a domain and provides some organizational checks. An OV certificate will have the "Issued to:" field occupied with the companies name it was issued to.
Term
Extended Validation
Definition
Shows that you own a domain and provides significant extra checks to the validity of the Organization.
Term
Cert. Issuing Process
Definition
On your server generate a public/private key pair

Embed the public key in a container along with info the cert authority wants such as domain name of the server.

The CA verifies the information and adds a signature to the container using their private key that only they have access to.
Term
HTTP Strict Transport Security (HSTS)
Definition
Lets websites declare that users can only interact with them over HTTPS and never HTTP.
Supporting users have an ad free experience!