Lesson 6 MT | Security Flashcards

(53 cards)

1
Q

Common security attacks and countermeasures

A
  • Firewalls & Intrusion
  • Detection Systems
  • Denial of Service Attacks
  • TCP Attacks
  • Packet Sniffing
  • Social Problems
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  1. Freedom from risk or danger; safety
  2. Freedom from doubt, anxiety, or fear; confidence.
  3. Something that gives or assures safety, as;
    - A group or department of private guards
    - Measures adopted by a government to prevent espionage, sabotage or attack
    - Measures adopted, as by a business or homeowner, to prevent a crime such as burglary or assault.
A

Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Why do we need security?

A
  • Protect vital information while still allowing access to those who need it
  • Provide authentication and access control for resources
  • Guarantee availability of resources
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Who is vulnerable?

A
  • Financial institutions and banks
  • Internet service providers
    -Pharmaceutical companies
  • Government and defense agencies
  • Contractors to various government agencies
  • Multinational corporations
  • ANYONE ON THE NETWORK
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the countermeasures with;

  • Finding a way into the network.
A

Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the countermeasures with;

  • Exploiting software bugs, buffer overflows
A

Intrusion Detection System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the countermeasures with;

Denial of Service

A

Ingress filtering, IDS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the countermeasures with;

  • TCP hijacking
A

IPSec

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the countermeasures with;

  • Packet sniffing
A

Encryption (SSH, SSL, HTTPS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the countermeasures with;

  • Social problems
A

Education

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Basic problem – many network applications and protocols have security problems that are fixed over time

A

Firewalls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A ____ is like a castle with a drawbrigde
- Only one point of access into the network
- This can be good or bad

A

Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

T or F

Firewall can be hardware or software

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Used to filter packets based on a combination of features

A

Firewall (Packet filtering firewalls)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Used to monitor for “suspicious activity” on a network.
- Can protect against known software exploits, like buffer overflows

Open Source IDS: Snort, www.snort.org

A

Intrusion Detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

We can run a _____ on the passwords
- the passwords in /etc/passwd are encrypted with the crypt(3) function (one-way hash)
- Can take a dictionary of words, crypt() them all, and compare with the hashed passwords

A

Dictionary attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

T or F
is “sdfo84f9f” a good password

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Make the network service unusable, usually by overloading the server or network.

Many different kind of ____ attack
- SYN flooding
- SMURF
- Distributed attacks
- Mini Case Study: Code-red

A

Denial of Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q
  • Source IP address of a broadcast ping is forged
  • Large number of machines respond back to victim, overloading it
A

SMURF

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q
  • Same techniques as regular DoS, but on a much larger scale
  • Infect a large number of machines with a “zombie” program
  • Zombie rogram logs into an IRC channel and awaits commands
A

Distributed Denial of Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q
  • July 19, 2001: over 359,000 computers infected with Code-Red in less than 14 hours
  • Used a recently known buffer exploit in Microsoft IIS
  • Damages estimated in excess of $2.6 billion
A

Mini Case Study -CodeRed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q
  • If the source IP of a packet comes in on an interface which does not have a route to that packet, then drop it
  • RFC 2267 has more information about this
A

Ingress filtering

23
Q

If an attacker learns the associated ____ state for the connection, then the connection can be hijacked

24
Q

Attacker can insert malicious data into the ____, and the recipient will believe it came from the original source

25
How can you prevent TCP attacks?
- Provide source authentication, so people can't pretend to be someone else - Encrypt data before transport.
26
- When someone wants to sent a packet to someone else - They put the bits on the wire with the destination MAC Address - And remember that other hosts are listening on the wire to detect for collisions - It couldn't get any easier to figure out what data is being transmitted over the network
Packet sniffing
27
T or F Does packet sniffing works for any broadcast-based medium
True
28
What kind of data hacker can get doing packet sniffing
Anything in plain text. Passwords are the most popular
29
How can we protect ourselves from packet sniffing
- SSH, not Telnet - HTTP over SSL - SFTP, not FTP - IPSec
30
Provides network-layer confidentiallity
IPSec
31
T or F SSL is better especially when making purchases with credit cards.
False. HTTP over SSL
32
____ can be configured to look for internal inconsistencies in traffic patterns
IDS
33
___ can be configured to block off one part of a corporate network from another part to further restrict access
Firewalls
34
Can also use _____ with strong encryption to identify who is doing what
Identification tokens
35
What are the Security principles
- Confidentiality - Integrity - Availability
36
Ensuring data is only accessible to authorized users
Confidentiality
37
Protecting data from unathorized modification
Integrity
38
Ensuring systems and data are available when needed
Availability
39
The foundation of all security
CIA Triad
40
Users should only have the minimum access necessary to perform their jobbs
Principle of Least Privilege
41
Using multiple layers of security (physical, network, and data security) to protect assets
Defense in Depth
42
The process of verifyring a user's identity. Example: Passwords, Biometrics (finger, faceID), and security tokens
Authentication (Who are you?)
43
Requiring two or more verification methods for increased security
Multi-Factor Authentication (MFA)
44
The process of grantingt permissions to an authenticated users Examples: Accessing specific files, editing a database, or enteringg a restricted area
Authorization (What can you do?)
45
Focused specifically on fixing security flaws on "plugging holes" in your defense
Security Patches
46
Often include bug fixes, performance improvements, and new features alongside security patches
Software Updates
47
How to update all packages
yum update -y
48
How to update security only
yum update --security -y
49
How to check for updates
yum check-update
50
Restricts which resources (like scripts) the browser is allowed to laod
Content Security Policy (CSP)
51
Forces the browser to use secure HTTPS connections only.
Strict-Transport-Security (HSTS)
52
Prevents "Clickjacking" by controlling whether a site can be rendered in an iFrame.
X-Frame-options
53
Prevents the browser from "guessing" the content type, which can lead to script execution.
X-Content-Type-Options