What are 2 types of attacks common in Network security?
“Reflection”
generating large amounts of traffic at a victim causing a DDOS attack. Extremely common type of attack.
“Phishing”
attempt to trick user into revealing sensitive info
What is wrong with the Internet’s design and why?
What is the problem with packet switch networks?
What are the 4 Components to Security?
What is Availability in Internet Security?
Ability to use a resource
What is Confidentiality in Internet Security?
Concealing information from prying eyes successfully
What is Authenticity in Internet Security?
It assures the correct origin of the information
What is Integrity in Internet Security?
Prevents unauthorized changes to packets/etc
In Security, what is considered a Threat?
Any potential violation of Availability, Confidentiality, Authenticity or Integrity
In Security, what is considered an Attack?
Any action that violates either Availability, Confidentiality, Authenticity or Integrity
What is an example of a threat to Confidentiality?
Eavesdropping with Wireshark and TCPdump in promiscuous mode
What is an example of a threat to Authenticity?
What is an example of a threat to Availability?
DDOS attack
What is DOS attack vs a DDOS attack?
A regular DOS attack comes from just one origin or host. A DISTRIBUTED DOS attack comes from multiple hosts.
In Security, what are the negative impacts of Attacks?
Routing Security (BGP)
What is the goal of control plane authentication?
To determine the veracity(accuracy) of routing advertisements
What is the goal of Data plane security
Determining if data is traveling to the intended locations
How do routing attacks occur?
Why do hijacks matter?
* Man In The Middle Attacks
What type of IP protocol connects ASes together?
TCP connections
What is sent over TCP between ASes?
We send a message and a hash of the message and the secret key