Shared Flashcard Set

Details

CCNA Security Chapter 1
Understanding Network Security Principles
93
Computer Networking
Professional
08/09/2010

Additional Computer Networking Flashcards

 


 

Cards

Term
Internal Threats
Definition

Most serious threat because...

 

  1. people already have knowledge of the network and available resources
  2. people already have some level of access granted to them because of their job
  3. traditional IPS and Firewall are ineffective against much misuse originating internally.
Term
External Threats
Definition

More technical

 

  • could perform ping sweep of network to identify IPs
  • then use port scan to identify open services
  • could then try to exploit known vulnerabilities for open services to gain access

many of these can be mitigated using network security tools and mechanisms

Term
3 Primary Goals of Network Security
Definition
  1. Confidentiality
  2. Integrity
  3. Availability
Term
Confidentiality
Definition

keeping data private

physically or logically restricting access to sensitive data

 

  • use Network Security mechanisms to prevent unauthorized access (Firewall and ACLs)
  • Require appropriate credentials to access specific network resources (Authentication)
  • encrypt traffic
Term
Integrity
Definition

ensures data hasn't been modified

verifies that traffic originates from source that should be sending it

 

Violations include:

  • modifying appearance of corporate website
  • intercepting and altering an e-commerce transaction
  • modifying financial records that are stored electronically
Term
Availability
Definition

measure of data's accessibility

 

Attempts to compromise the availability of network include:

 

  • send improperly formatted data to a networked device, resulting in unhandled exception error
  • flood a network system with excessive amount of traffic or requests (DoS)
Term

Government/Military Data Classification

 

Unclassified

 

Definition
Data has few or no privacy requirements
Term

Government/Military Data Classification

 

Sensitive but unclassified (SBU)

Definition
Data could cause embarrassment but not constitute a security threat if revealed
Term

Government/Military Data Classification

 

Confidential

Definition
Data that has a reasonable probability of causing damage if disclosed to an unauthorized party
Term

Government/Military Data Classification

 

Secret

Definition
Data has a reasonable probability of causing serious damage if disclosed to an unauthorized party
Term

Government/Military Data Classification

 

Top-secret

Definition
Data has a reasonable probability of causing exceptionally grave damage if disclosed to an unauthorized party
Term

Organizational Data Classification

 

Public

Definition

Information made available to the public

(through marketing materials)

Term

Organizational Data Classification

 

Sensitive

Definition
Data that could cause embarrassment but not constitute a security threat if revealed
Term

Organizational Data Classification

 

Private

Definition
Organizational infromation that should be kept secret and whose accuracy should be maintained
Term

Organizational Data Classification

 

Confidential

Definition
Sensitive organizational information (for example, employee records) that should be protected with great care
Term

Data Classification Characteristics

 

Value

Definition
How valuable the data is to the organization
Term

Data Classification Characteristics

 

Age

Definition
How old the data is
Term

Data Classification Characteristics

 

Useful life

Definition
How long the data will be considered relevant
Term

Data Classification Characteristics

 

Personal Association

Definition
How personal the data is
Term

Classification Roles

 

Owner

Definition

-Initially determines the classification level

 

-Routinely reviews documented procedures for classifying data

 

-Gives the custodian the responsibility of protecting the data

Term

Classification Roles

 

Custodian

Definition

-Keeps up-to-date backups of classified data

 

-Verifies the integrity of the backups

 

-Restores data from backups on an as-needed basis

 

-Follows policy guidelines to maintain specific data

Term

Classification Roles

 

User

Definition

-Accesses and uses data in accordance with an established security policy

 

-Takes reasonable measures to protect the data he or she has access to

 

-Uses data for only organizational purposes

Term

Security Solution Controls

 

Administrative Controls

Definition

primarily policy-centric

 

Examples:

  • Routine security awareness training programs
  • Clearly defined security policies
  • Change management system, which notifies parties of system changes
  • Logging configuration changes
  • Properly screening potential employees
Term

Security Solution Controls

 

Physical Controls

Definition

help protect the data's environment and prevent potential attackes from readily having physical access to the data

Examples:

  • Security systems to monitor for intruders
  • Physical security barriers (i.e. locked doors)
  • Climate protection systems, to maintain proper temp and humidity, in addition to alerting personnel in case of fire
  • Security personnel to guard the data
Term

Security Solution Controls

 

Technical Controls

Definition

variety of hardware and software technologies to protect data

 

Examples

  • security appliances - Firewalls, IPSs, VPN termination
  • Authorization applications - RADIUS or TACACS+ servers, one-time passwords, biometric security scanners
Term
Preventive Control
Definition
Attempts to prevent access to data or a system
Term
Deterrent Control
Definition
attempts to prevent a security incident by influencing the potential attacker not to launch an attack
Term
Detective Control
Definition
Can detect when access to data or a system occurs
Term

Responding to Security Incident

 

Motive

Definition

describes why the attacker committed the act

 

Example - could be a disgruntled employee?

 

Potential motives can be valuable to define during an investigation

Specifically an invesigation may start out by looking at those who had a motive to carry out the attack.

Term

Responding to Security Incident

 

Means

Definition

with all security controls in place to protect data or computer systems, need to determined if the accused had means to carry out the attack

 

Example

did the individuals have the technical skills

Term

Responding to Security Incident

 

Opportunity

Definition

was the accused available to commit the attack

 

 

Term
Criminal Law
Definition
applies to crimes that have been committed and that might result in fines and/or imprisonment for someone found guilty
Term
Civil Law
Definition

addresses wrongs that have been committed; but wrongs are not considered criminal

 

Example

  • civil litigation might involve patent infringement
Term
Administrative Law
Definition
typically involves the enforcement of regulations by government agencies
Term
Vulnerability
Definition
weakness that an attacker might leverage to gain unauthorized access to the system or its data
Term
Exploit
Definition
something used to take advantage of the vulnerability
Term
White Hat hacker
Definition

has skills to break into computer systems and do damage

 

uses skills to help organizations

Term
Black Hat hacker
Definition
also known as cracker uses skills for unethical reasons
Term
Gray Hat hacker
Definition
can be thought of as a white hat hacker who occasionally strays and acts unethically
Term
Phreaker
Definition

hacker of a telecommunications system

Examples

  • Captain Crunch used a toy whistle (which generated a 2600-Hz tone) to trick phone systems into letting him place free long distance calls
  • Convincing a telecommunications carrier to permit free long distance calls in this manner is an example of phreaking
Term
Script Kiddy
Definition

user who lacks the skills of a typical hacker

 

downloads hacking utilities and uses those utilities to launch attacks, rather than writing own programs

Term
Hacktivist
Definition

hacker with political motivations

 

Example

  • someone who defaces the website of a political candidate
Term
Computer security hacker
Definition

knowledgeable about the technical aspects of computer and network security systems

 

Example

  • might attempt to attack a system protected by IPS by fragmenting malicious traffic in a way that would go undetected by the IPS
Term
Academic Hacker
Definition

typically is an employee or student at an institution of higher education. Uses institution's computing resources to write "clever" programs.

 

Typically these types use their real names and they tend to focus on open-standards-based software and operating systems

Term
Hobby hacker
Definition

tends to focus on home computing

might modify exisiting hardware or software to use software without a legitimate license

Term
Passive Attack
Definition

difficult to detect because the attacker isn't actively sending traffic (malicious or otherwise)

 

Example

 

  • attacker capturing packets from the network and attempting to decrypt them (if traffic was encrypted originally)
Term
Active attack
Definition

easier to detect because the attacker is actively sending traffic (malicious and otherwise)

 

Example

  • might launch an active attacke in an attempt to access classifed information or to modify data on a system
Term
Close-in attack
Definition

occurs when the attacker is in close physical proximity with the target system

 

Example

  • an attacker can bypass password protection on some routers, switches and servers if he gains physical access to those devices
Term
Insider attack
Definition

occurs when legitimate network users leverage their credentials and knowledge of the network in a malicious fashion

 

Term
Distribution attack
Definition

Intentionally introduce back doors to hardware or software systems at the point of manufacture.

 

Example

  • After systems have been distributed to a variety of customers, the attacker can use knowledge of the implanted back door to access protected data, manipulate data or make the target system unusable by legitimate users
Term
Defense in Depth
Definition

Design philosphy that achieves this layered security approach

 

should provide redundancy for one another while offering a variety of defense strategies for protecting multiple aspects of a network

 

single points of failure in a security solution should be eliminated, and weak links in the security solution should be strengthened

Term
Defense in Depth design
Definition
  • Defend multiple attack targets in network -protect the network infrastructure -protect strategic computing resources, such as HIPS
  • Create overlapping defenses - IDS and IPS
  • Let the value of a protected resource dictate strength of security mechanism - deploy more resources to protect a network boundary as opposed to the resources to protect an end-user workstation
  • Use strong encryption technologies
Term
TCP Three-Way Handshake
Definition
  1. originator sends a SYN segment to the destination, along with a sequence number
  2. destination sends an acknowledgement (an ACK) of the originator's sequence number along with the destination's own sequence number (a SYN)
  3. orginator sends an ACK segment to acknowledge the destination's sequence number, after which the TCP communication channel is open between the originator and destination
Term
Types of IP Spoofing
Definition

Nonblind

Blind

Term
Nonblind spoofing
Definition
occurs when attacker and the destination are on the same subnet. By being on the same subnet, the attacker might be able to use a packet-capture utility to glean sequence numbers
Term
Blind spoofing
Definition

occurs when attacker is not on the same subnet as the destination

obtaining correct sequence numbers is more difficult

 

Using techniques such as IP source routing, an attacker can accurately determine those sequence numbers

Term
Source routing variations
Definition
  1. Loose
  2. Strict
Term
Loose source routing
Definition
attacker specifies a list of IP addresses through which a packet must travel. However, the packet could also travel through additional routers that interconnect IP addresses specifed in the list
Term
Strict source routing
Definition
IP addresses in the list specified by the attacker are the only IP addresses through which a packet is allowed to travel
Term
Protect against IP Spoofing Attack
Definition

Use access control lists on router interfaces

 

Encrypt traffic between devices via an IPsec tunnel

 

Use cryptographic authentication

Term

Confidentiality Attack Strategies

 

Packet Capture

Definition

Wireshark for example, can capture packets visible by a PC's NIC by replacing the NIC in promiscuous mode.

 

Some protocols (HTTP, Telnet) are sent in plain text; therefore, an attacker can read these types of captured packets, perhaps allowing him to see confidential information

Term

Confidentiality Attack Strategies

 

Ping sweep and port scan

Definition

confidentiality attack might start with a scan of network resources, to identify attack targets on a network. A ping sweep could be used to ping a series of IP addresses. As soon as a collection of IP addresses is identified, attacker might scan a range of UDP and/or TCP ports to see what services are available on the host at the specified IP address.

 

Port scans often help attackers identify the OS running on the target system

Term

Confidentiality Attack Strategies

 

Dumpster diving

Definition
because many companies throw away confidential information without properly shredding it, some attackers might rummage through company dumpsters in hopes of discovering information that could be used to compromise network resources
Term

Confidentiality Attack Strategies

 

Electromagnetic interference (EMI) interception

Definition

data is often transmitted over wire (UTP wire) attackers can sometimes copy information traveling over the wire by intercepting EMI being emitted by the transmission medium.

 

EMI emissions are sometimes called emanations

Term

Confidentiality Attack Strategies

 

Wiretapping

Definition

if an attacker gains physical access to a wiring closet, they might be able to physically tap into telephone cabling to eavesdrop on telephone conversations

 

might also insert a shared media hub inline with a network cable. Could let him connect to the hub and receive copies of packets flowing through the network cable.

Term

Confidentiality Attack Strategies

 

Social engineering

Definition
sometimes use social techniques to obtain confidential information
Term

Confidentiality Attack Strategies

 

sending information over overt channels

Definition

attacker might send or receive confidential information over a network using an overt channel.

 

Example

  • using one protocol inside another (sending instant messaging traffic via HTTP)
  • Steganography is sending a digital image made up of millions of pixels with secret information encoded in specific pixels. Only the sender and receiver know which pixels represent the encoded info
Term

Confidentiality Attack Strategies

 

Sending information over covert channels

Definition

attacker might send or receive confidential information over a network using a covert channel, which can communicate information as a series of codes and/or events.

 

Example

  • binary data could be represented by sending a series of pings to a destination - single ping within a certain period of time could represent binary 0 and two pings within that same period of time could represent binary 1
Term

Integrity Attacks

 

Salami Attack

Definition

collection of small attacks that result in a larger attack when combined

 

Example

  • if attacker had a collection of stolen credit card numbers, he could withdraw small amount of money from each credit card. Although each withdrawl is small, they add up to be a significant sum for attacker
Term

Integrity Attacks

 

Data Diddling

Definition

changes data before it is stored in a computing system

malicious code in an input application or virus could perform data diddling.

 

Example

  • a virus, Trojan horse, or worm could be written to intercept keyboard input. It would display the appropriate characters on-screen so that the user would not see a problem. Manipulated characters would be entered into a database app or sent over network
Term

Integrity Attacks

 

Trust relationship exploitation

Definition

Certain hose might be trusted to communicate through a firewall using specific ports. If an attacker could compromise the host that had a trust relationship with the firewall, the attacker could use the compromised host to pass normally denied data through a firewall.

 

A web server and a database server mutually trusting one another. If attacker gained control of the web server, he might be able to leverage that trust relationship to compromise the database server.

Term

Integrity Attacks

 

Password Attacks

Definition

attempts to determine a user's password

 

as soon as username and password are gained, the attacker can attempt to log into a system as that user, and therefore inherit that user's set of permissions

Term

Integrity Attacks - Password Attacks

 

Trojan horse

Definition
Program that appears to be a useful application captures the user's password and then makes it available to the attacker
Term

Integrity Attacks - Password Attacks

 

Packet capture

Definition

packet-capture utility can capture packets seen on a PCs NIC.

 

if the PC can see a copy of a plain-text password being sent over a link, the packet-capture utility can be used to glean the password

Term

Integrity Attacks - Password Attacks

 

Keylogger

Definition

program that runs in the background of a computer, logging the user's keystrokes

 

after a user enters a password, it is stored in the log created by the keylogger. An attacker then can retrieve the log of keystrokes to determine the user's password

Term

Integrity Attacks - Password Attacks

 

Brute force

Definition

tries all possible password combinations until a match is made.

 

Example

  • brute-force attack might start with the letter a and go through the letter z
  • then the letters aa through zz are attempted, until password is determined

Using mixture of uppercase and lowercase helps mitigate brute force

Term

Integrity Attacks - Password Attacks

 

Dictionary Attack

Definition
similar to a brute-force attack, in that multiple password guesses are attempted; based on a dictionary of commonly used words, rather than brute-force
Term

Integrity Attacks

 

Botnet

Definition

software robot typically is through of as an application on a machine that can be controlled remotely

 

if collection of computers is infected with such software robots, called bots, this collection of computers (zombies) is known as a botnet.

 

Because of the potentially large size of a botnet, it might comrpomise the integrity of a large amount of data

Term

Integrity Attacks

 

Hijacking a session

Definition
if an attacker successfully hijacked a session of an authorized device, he might be able to maliciously manipulate data on the protected server
Term

Availability Attacks

 

Denial of Service (DoS)

Definition

attacker can launch a DoS attack on a system by sending the target system a flood of data or requests that consume the target system's resources

 

Alternatively, some OS and applications might crash when they receive specific strings of improperly formatted data, and the attacker could leverage such OS and/or app vulnerabilities to render a system or application inoperable.

Attacker often uses IP Spoofing to conceal his identity

Term

Availability Attacks

 

Distributed denial of server (DDoS)

Definition

can increase the amount of traffic flooded to a target system. Specifically, the attacker compromises multiple systems.

The attacker can instruct those compromised systems, called zombies, to simultaneously launch a DDoS attack against a target system

Term

Availability Attacks

 

TCP SYN flood

Definition

one variant of DoS attacks is for an attacker to initiate multiple TCP sessions by sending SYN segments but never completing the three-way handshake

 

can send multiple SYN segments to a target system, with false source IP addresses in the header

 

Because many servers limit the number of TCP sessions they can have open simultaneously, a SYN flood can render a target system incapable of opening a TCP session with a legitimate user

Term

Availability Attacks

 

ICMP Attacks

Definition

Many networks permit ICMP traffic because pings can be useful in network troubleshooting. Attackers can use ICMP for DoS attacks.

 

 

Term

Availability Attacks - ICMP Attacks

 

Ping of Death

Definition

ICMP DoS attack uses ICMP packets that are too big

 

ICMP traffic as series of fragments in an attempt to overflow the fragment reassembly buffers on the target device

Term

Availability Attacks - ICMP Attacks

 

Smurf Attack

Definition
can use ICMP traffic directed to a subnet to flood a target system with ping replies
Term

Availability Attacks

 

Electrical disturbances

Definition

at physical level - attacker could launch an attack by interrupting or interfering with the electrical service available to a system.

 

 

Term

Availability Attacks - Electrical disturbances

 

Power spike

Definition
excess power for a brief period of time
Term

Availability Attacks - Electrical disturbances

 

Electrical surge

Definition
excess power for an extended period of time
Term

Availability Attacks - Electrical disturbances

 

Power fault

Definition
a brief electrical outage
Term

Availability Attacks - Electrical disturbances

 

Blackout

Definition
an extended electrical outage
Term

Availability Attacks - Electrical disturbances

 

Power sag

Definition
a brief reduction in power
Term

Availability Attacks - Electrical disturbances

 

Brownout

Definition
An extended reduction in power
Term

Availability Attacks

 

Attacks on system's physical environment

Definition

could intentionally damage computing equipment by influencing the equipment's physical environment

Example

  • temperature - computing equipment generates heat, attacker could intefere with AC system, equipment could overheat
  • Humidity - computing equipment is intolerant of moisture, attacker could create a high level of humidity
  • Gas - can be flammable so attacker could inject gas, where small sparks could create fire
Supporting users have an ad free experience!