Cybersecurity w4 Flashcards

(21 cards)

1
Q

OSI Layers

A

Layer 7 : Application
Layer 6: Presentation
Layer 5: Session
Layer 4: Transport
Layer 3: Network
Layer 2: Data Link
Layer 1: Physical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

OSI Layer 1

A

Layer 1: Physical
Everything you connect to a physical device:
USB
Hubs
Cables
Repeaters

Data transportation on bit levels
10111010111010101101011110

Topologies:
Bus
Mesh
Star
Tree
Ring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

OSI Layer 2

A

Layer 2: Data Link
This layer deals with addressing the physical hardware

Data transportation on frame level
PPTP
L2TP
ARP
Token Ring

  • Logical Link Control (flow control + error notification)
  • MAC addresses
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

OSI Layer 3

A

Layer 3: Network
Handles path selection and logical addressing

Data transportation on packet level
IP addresses
OSPF
IP
DHCP
ICMP

Layer 3 concerns Routers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

OSI Layer 4

A

Layer 4: Transport
Handles end-to-end data transfer services and reliability

Data transportation on datagram level
Segmentation
Sequencing
Error checking

Protocols:
- TCP
- UDP
- SSL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

OSI Layer 5

A

Layer 5: Session
Handles inter-host communications
Simplex
Half duplex
Full duplex

Protocols:
PAP: Password Authentication Protocol
PPTP: Point-to-Poin tunneling protocol
RPC: Remote Procedure Call Protocol
NFS: Network File System

Layer 5 concerns Gateways

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

OSI Layer 6

A

Layer 6: Presentation
Handles
Compression and decompression
Encryption and decryption

Common format to repretent data standards such as: JPEG, MID, TIFF

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

OSI Layer 7

A

Layer 7 : Application
Handles user data

Protocols:
SSL: Secure Socket Layer
Telnet
FTP
(s)FTP
SNMP
SMTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

OSI Layer Security

A

In alle lagen van de OSI Layer dien je maatregelen te nemen voor de informatiebeveiliging, doch de mensen blijven de zwakste schakel.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

TCP/IP Model

A

TCP/IP Layer -> Protocols in each layer

Layer 4 Application Layer -> HTTP, RDP, DHCP, DNS, X windows, Telnet, SMTP, SSH, TFTP, SNMP, FTP

Layer 3 Transport Layer -> TCP, UDP

Layer 2 Internet Layer -> ICMP, IGMP, ARP, IPv4/IPv6

Layer 1 Network acces Layer -> Ethernet, FDDI, x.25, Frame Relay, Token Ring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

OSI Layer vs TCP/IP Model

A

OSI Layers

7, 6, 5 -> Application
4 -> Transport
3 -> Internet
2, 1 -> Network Interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Firewalls

A

Packet filtereing firewall=pakket mag door of niet
Stateful packet filtering firewall=ziet of sessie vanuit intern is opgestart
Application proxy firewalls= kijkt naar applicatie content
Circuit leven proxy FW=proxy firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

IPS

A

IPS – Intrusion Prevention System
Detects malicious traffic and intervein when deemed necessary
- Policy based (signature)
- Heuristic scanning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

IDS

A

IDS – Intrusion Detection System
Detects malicious traffic and sends an alert when deemed necessary
- Policy based (signature)

Human interaction required

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Wireless

A

Ad hoc Mode: directly connect two+ clients, no access point
Infrastructure Mode: connects endpoints to a central network, not directly to each other
Stand-alone Mode: isolated system
WEP: don’t use can be cracked in seconds, predecessor to WPA and WPA2.
WPA: uses TKIP for data encryption
WPA2: based on 802.11i, uses AES, key management, reply attack protection, and data integrity (2004)
WPA3: improved version of WPA2 (2018)

WEP= no go (verdien je stokslagen als je het gebruikt)
WPA= is beter maar is ook kwetsbaar

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

VPN - Protocols

A

PPTP, Point to Point tunneling protocol
L2F, Layer 2 Forwarding
L2TP, Layer 2 tunneling protocol
TLS – Transport Layer Security
IPsec

17
Q

Digital

A

IPSEC
2 protocols: AH Authentication header and ESP Encapsulated Security Payload
works with Security Associations (SA’s)
works with IKE protocols IKE IS FOR MANAGING SECURITY ASSOCIATIONS
2 modes:
transport: data is encrypted header is not
tunneled: new uses rc6; IP header is added, old IP header and data is encrypted

18
Q

TOR

A

HetTor-netwerkverbergt je identiteit door je internetverkeer om te leiden langs verschillendeTor-servers (of ‘nodes’). Je data wordt versleuteld en dan over de verschillende nodes gestuurd, waar de verschillende encryptie-lagen stuk voor stuk ontsleuteld worden, tot de data uiteindelijk ‘kaal’ op zijn bestemming is.

Tor network= losse vpn netwerk tussen pc’s.

Er is altijd een stuk wat niet ge-encypt is, communicatie richting de vpn tunnel.

19
Q

Common Cyber Attacks

A

Bluejacking: when attackers send unsolicited messages via Bluetooth

Spoofing: when an attacker sends false replies to a requesting system, beating valid replies from the real (email) server. (DNS, Email)

DOS: performed by sending malformed packets to a system; can interrupt service or completely deny legitimate users of system resources.

DDOS: botnet, zombie, massive dos attack using multiple computers

SMURF: ICMP requires three players (attacker, victim and amplifying network); attacker spoofs packet header to make it appear that it originated on the victim system with amplifying network broadcasting the message.

SYN FLOOD: TCP packets requesting a connection (SYN bit set) are sent to the target network with a spoofed source address. The target responds with a SYN-ACK packet, but the spoofed source never replies.

20
Q

Samenvatting HC week 4

A

Dit hoorcollege bestond uit een verscheidenheid aan onderwerpen rondom het thema netwerken en communicatie. Er is gesproken over het OSI model, het theoretische model aangaande netwerkcommunicatie.
De netwerk security devices Firewalls en IPS/IDS’sen zijn besproken. Verder zijn draadloze en virtuele netwerken aan bod gekomen evenals de beveiliging ervan.
Er is besproken wat een VPN is, ook Tor als VPN netwerk is aan bod gekomen.
De verschillende soorten aanvallen die op netwerken uitgevoerd kunnen worden zijn besproken
Een bekende security methode ter beveiliging van netwerken: defense in depth.

21
Q

Begrippenlijst

A

PPTP = Point-to-Point Tunneling Protocol
L2TP = Layer 2 Tunneling Protocol
L2F = Layer 2 Forwarding
TLS = Transport Layer Security
ARP = Address Resolution Protocol
MAC = Media Access Control
IDS = Intrusion Detection System
IPS = Intrusion Protection System
IP = Internet Protocol
OSPF = Open Shortest Path First
DHCP = Dynamic Host Configuration Protocol
ICMP = Internet Control Message Protocol
TCP = Transmission Control Protocol
UDP = User Datagram Protocol
SSL = Secure Sockets Layer
PAP = Password Authentication Protocol
RPC = Remote Procedure Call
NFS = Network File System
FTP = File Transfer Protocol
SNMP = Simple Network Management Protocol
SMTP = Simple Mail Transfer Protocol
WEP = Wired Equivalent Protocol
WPA = Wi-Fi Protected Access
TKIP = Temporal Key Integrity Protocol
LEAP = Lightweight Extensible Authentication Protocol
AP = Access Point
PTK = Pairwise Transit Key
GTK = Group Temporal Key
HTTP = Hyper Text Transfer Protocol
VM = Virtual Machine
OS = Operating System
DoS = Denial of Service