Chapter 11 - Network Security Flashcards

(57 cards)

1
Q

The number of security incidents is growing by about ________ per year.

A

30%

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the three main reasons why there has been an increase in computer security over the past few years?

A

1) Hacking into a computer used to be considered a hobby, whereas it is now a profession.

2) hacktivism has become more common

3) increase in mobile devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

_____________ are hardware, rules, or procedures that reduce or eliminate the threats to network security. They prevent, detect, and/or correct whatever might happen to the organization because of threats facing its computer-based systems.

A

Controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

_______________ mitigate or stop a person from acting or an event from occurring. Some examples are a password, a guard, or a security lock on a door.

A

Preventitive controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

_______________ reveal or discover unwanted events.

A

Detective controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

___________________ remedy an unwanted event or intrusion.

A

Corrective controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the three risk assessment frameworks that are most commonly used?

A

1) Operationally Critical Threat, Asset, and Vulnerability Evaluation (OCTAVE) from the Computer Emergence Readiness Team

2) Control Objectives for Information and Related Technology (COBIT) from the Information Systems Audit and Control Association

3) Risk Management Guide for Information Technology Systems (NIST guide) from the National Institute of Standards and Technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the five common steps across the risk assessment frameworks?

A

1) Develop risk measurement criteria

2) Inventory IT assets

3) Identify threats

4) Document existing controls

5) Identify improvements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are teh five most common impact areas in a risk assessment?

A

1) financial (revenues and expenses)

2) productivity (business operations)

3) reputation (customer perceptions)

4) safety (the health of customers and employees

5) legal (potential for fines and litigation)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A ____________________ is an information system that is critical to the survival of the organization. It is an application that cannot be permitted to fail, and if it does fail, the network staff drops everything else to fix it.

A

mission-critical application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What question should be asked to rank the importance of assets?

A

What would happen if this information asset’s confidentiality, integrity, or accessibility were compromised?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How does one calculate an impact score?

A

By multiplying the priority of each area by the impact the threat would have, using a 1 for a low value, a 2 for a medium value, and a 3 for a high value, and summing all the results.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How does one calcuate the relative risk score?

A

By multiplying the impact score by the likelihood (using 1 for low likelihood, 2 for medium likelihood, and 3 for high likelihood).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A ________________ is the way an organization intends to address a risk.

A

risk control strategy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

__________________ involves implementation of some type of a control to counter the threat or to minimize the impact. An organization can implement several types of controls, such as using antivirus software, implementing state-of-the-art firewalls, or providing security training for employees.

A

Risk mitigation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

_________________ is configuring the main router that connects your network to the Internet (or firewall) to verify that the source address of all incoming messages is in a valid address range for that connection

A

Traffic filtering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

_________________ is configuring the main router (or firewall) to limit the number of incoming packets that could be DoS/DDoS attack packets that it allows to enter the network, regardless of their source

A

Traffic limiting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A _____________________ is a device that monitors normal traffic patterns and learns what normal traffic looks like.

A

traffic anomaly detector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

The best way to prevent a failure from impacting business continuity is to build _____________ into the network.

A

redundancy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Most organizations build redundancy into their ______________ and their _______________ but are very careful in choosing which distribution backbones (i.e., building backbones) and access layer LANs will have redundancy

A

core backbone, Internet connections

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

________________________ is a storage technology that, as the name suggests, is made of many separate disk drives. When a file is written to this device, it is written across several separate, redundant disks.

A

Redundant array of independent discks (RAID)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

A critical element in correcting problems from a disaster is the __________________, which should address various levels of response to a number of possible disasters and should provide for partial or complete recovery of all data, application software, network components, and physical facilities.

A

disaster recovery plan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

With __________, copies of all data and transactions on selected servers are written to servers as the transaction occurs. This is more flexible than traditional backups that take snapshots of data at specific times or than disk mirroring, which duplicates the contents of a disk from second to second. This enables data to be stored miles from the originating server and time-stamps all transactions to enable organizations to restore data to any specific point in time.

A

Continuous data protection (CDP)

24
Q

What are the four types of intruders?

A

1) Novice attackers hwo use hacking tools (script kiddies)

2) hackers/crackers: experts in security, but their motivation is the thrill of the hunt

3) professional hackers

4) organization employees who have legitimate access to the network but who gain access to information they are not authorized to use.

25
In late 1990s, the DoD noticed a small but growing set of intentional attacks that they classify as exercises, exploratory attacks designed to test the effectiveness of certain software attack weapons. Therefore, they established an ___________________ and a new organization responsible for coordinating the defense of military networks under the U.S. Space Command.
information warfare program
26
What are the most common access points for intrusion into networks?
1) Internet connection (70%) 2) LANs and WLANs (30%)
27
_______________ are more likely to intrude via the Internet connection, whereas _________________ are most likely to use the LAN or WLAN.
External intruders, internal intruders
28
A _____________________ examines the source and destination address of every network packet that passes through it. It only allows packets into or out of the organization’s networks that have acceptable source and destination addresses.
packet-level firewall
29
The set of rules for the packet-level firewall so it knows what packets to permit into the network and what packets to deny entry is called a(n):
access control list (ACL)
30
A(n) _______________ is more expensive and more complicated to install and manage because it examines the contents of the application-level packet and searches for known attacks.
application-layer firewall
31
____________________ is the process of converting between one set of public IP addresses that are viewable from the Internet and a second set of private IP addresses that are hidden from people outside of the organization.
Network address translation (NAT)
32
The ___________________ uses an address table to translate the private IP addresses used inside the organization into proxy IP addresses used on the Internet. When a computer inside the organization accesses a computer on the Internet, the firewall changes the source IP address in the outgoing IP packet to its own address.
NAT firewall
33
The _____________________ is a physical or logical subnetwork that exposes an organization’s external-facing servers (such as Web Server, DNS Server, Mail Server) to the Internet.
DMZ (demilitarized zone)
34
Wireless LANs are the easiest target for _________________ because they often reach beyond the physical walls of the organization.
eavesdropping
35
Attacks that take advantage of a newly discovered security hole before a patch is developed are called __________________.
zero-day attacks
36
The American government requires certain levels of security in the operating systems and network operating systems it uses for certain applications. The minimum level of security is:
C2
37
Spyware, adware, and DDoS agents are three types of ______________.
Trojans
38
One of the best ways to prevent intrusion is ____________, which is a means of disguising information by the use of mathematical rules known as cryptography.
encryption
39
_______________ is the process of disguising information, whereas _____________ is the process of restoring it to readable form.
Encryption, decryption
40
When information is in readable form, it is called _____________; when in encrypted form, it is called ______________.
plaintext, ciphertext
41
With ____________________, the key used to encrypt a message is the same as the one used to decrypt it. With ___________________, the key used to decrypt a message is different from the key used to encrypt it.
symmetric encryption, asymmetric encryption
42
Symmetric encryption (also called single-key encryption) has two parts:
the algorithm and the key
43
One commonly used symmetric encryption technique is the _____________________, which was developed in the mid-1970s by the U.S. government in conjunction with IBM.
Data Encryption Standard (DES)
44
The NIST’s new standard, called _______________________, has replaced DES. It has key sizes of 128, 192, and 256 bits. NIST estimates that using the most advanced computers and techniques available today, it will require about 150 trillion years to crack AES by brute force.
Advanced Encryption Standard (AES)
45
_____________ can use a key up to 256 bits long but most commonly uses a 40-bit key. It is faster to use than DES but suffers from the same problems from brute-force attacks: Its 40-bit key can be broken by a determined attacker in a day or two.
RC4
46
Because public key encryption is asymmetric, there are two keys. One key (called the _____________) is used to encrypt the message and a second, very different _______________ is used to decrypt the message.
public key, private key
47
Explain asymmetric encryption or public key encryption:
Each user has its public key that is used to encrypt messages sent to it. These public keys are widely publicized (e.g., listed in a telephone-book-style directory)—that’s why they’re called “public” keys. In addition, each user has a private key that decrypts only the messages that were encrypted by its public key. This private key is kept secret (that’s why it’s called the “private” key). The net result is that if two parties wish to communicate with each other, there is no need to exchange keys beforehand. Each knows the other’s public key from the listing in a public directory and can communicate encrypted information immediately. The key management problem is reduced to the on-site protection of the private key.
48
The ________________ is a set of hardware, software, organizations, and polices designed to make public key encryption work on the Internet.
PKI
49
A ___________________ is a trusted organization that can vouch for the authenticity of the person or organization using authentication (e.g., VeriSign).
certificate authority (CA)
50
_______________________ is a freeware public key encryption package developed by Philip Zimmermann that is often used to encrypt email.
Pretty Good Privacy (PGP)
51
______________________ is an encryption protocol widely used on the Web. It operates between the application-layer software and the transport layer (in what the OSI model calls the presentation layer).
Secure Sockets Layer (SSL)
52
_________________ sits between IP at the network layer and TCP/UDP at the transport layer.
Internet Security Protocol (IPSec)
53
More and more organizations are adopting _________________ (also called network authentication, single sign-on, or directory services), in which a log-in server is used to authenticate the user. Instead of logging into a file server or application server, the user logs into the authentication server.
central authentication
54
The most commonly used authentication protocol is ____________________.
Kerberos
55
_________________________ are designed to detect an intrusion and take action to stop it.
Intrusion prevention systems (IPSs).
56
What are the two types of IPSs?
Network-based IPS: An IPS sensor is placed on key network circuits. An IPS sensor is simply a device running a special operating system that monitors all network packets on that circuit and reports intrusions to an IPS management console. Host-based IPS: A software package installed on a host or server. The host-based IPS monitors activity on the server and reports intrusions to the IPS management console.
57
What are the two fundamental techniques that IPSs use to detect an intrusion?
1) misuse detection, which compares monitored activities with signatures of known attacks. Whenever an attack signature is recognized, the IPS issues an alert and discards the suspicious packets. 2) anomaly detection, which works well in stable networks by comparing monitored activities with the “normal” set of activities. When a major deviation is detected (e.g., a sudden flood of ICMP ping packets, an unusual number of failed log-ins to the network manager’s account), the IPS issues an alert and discards the suspicious packets.