Computer Network Security Unit 1: CIA Triad
9 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What are the three key objectives in Computer Security according to the CIA triad?

  • Confidentiality
  • Integrity
  • Availability
  • All of the above (correct)
  • What does confidentiality ensure?

    Private information is only accessible to authorized people.

    What does a loss of integrity refer to?

    Unauthorized modification or destruction of information.

    The key step to manage risks that involves implementing safeguards is called ______.

    <p>Protect</p> Signup and view all the answers

    A MAC address is a unique identifier assigned to a Network Interface Card (NIC).

    <p>True</p> Signup and view all the answers

    What part of the Ethernet frame is used for error detection?

    <p>Cyclic Redundancy Check (CRC)</p> Signup and view all the answers

    What is the purpose of the ARP protocol?

    <p>To map IP addresses to MAC addresses.</p> Signup and view all the answers

    How can ARP cache poisoning occur?

    <p>By injecting forged MAC addresses</p> Signup and view all the answers

    The ______ is used to improve efficiency by temporarily storing MAC addresses.

    <p>ARP cache</p> Signup and view all the answers

    Study Notes

    CIA Triad

    • Confidentiality: Protects private information from unauthorized access; allows users control over their data; loss results in unauthorized disclosure.
    • Integrity: Ensures data and systems can only be modified by authorized users; loss results in unauthorized changes or destruction of information.
    • Availability: Guarantees that systems and data are accessible to authorized users without interruptions; loss results in denied access to information or systems.

    Cybersecurity Framework

    • Identify: Recognize security risks associated with systems, data, and assets.
    • Protect: Implement security measures to safeguard critical information and services.
    • Detect: Monitor to identify security events or breaches.
    • Respond: Execute a response plan to address detected security incidents.
    • Recover: Restore systems and data after a security event has occurred.
    • Ethernet Frame: The fundamental unit of data in Ethernet networks, containing necessary information for transmission.
    • MAC Address: A unique identifier for each Network Interface Card (NIC); ensures device communication on local networks.
    • Ethernet Frame Structure:
      • Destination MAC Address (6 bytes)
      • Source MAC Address (6 bytes)
      • Ether Type (2 bytes), indicating the protocol type (IPv4, IPv6)
      • Data/Payload (46-1500 bytes), containing the actual transmitted data
      • Cyclic Redundancy Check (CRC) (4 bytes), used for error detection.

    MAC Address Tracking and Privacy Concerns

    • Mobile devices broadcast MAC addresses while scanning for Wi-Fi, posing security risks.
    • Adversaries can collect and link MAC addresses across access points to identify users, raising privacy issues.
    • Hop-By-Hop Transmission: Updates the MAC address at each stage of packet routing, complicating tracking attempts by adversaries.

    Address Resolution Protocol (ARP)

    • Function: Maps IP addresses to MAC addresses for local network communication.
    • ARP Request: Broadcasts to identify a device’s MAC address using its IP address.
    • ARP Reply: Responds with the MAC address, which is saved in the ARP Cache for efficiency.
    • ARP Cache: A temporary store for MAC addresses to reduce repeated requests; entries expire over time for updated accuracy.

    ARP Cache Management Commands

    • To view the cache: arp -n
    • To delete an entry: sudo arp -d [IP ADDRESS] (entry appears as incomplete until updated).

    ARP Cache Poisoning

    • Definition: Involves injecting fake MAC addresses into a device’s ARP cache, leading to misdirected traffic.
    • Risks: Results in mapped incorrect MAC and IP addresses, leading to potential security vulnerabilities.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Description

    Explore the key objectives of Computer Security in this quiz focused on the CIA Triad: confidentiality, integrity, and availability. Understand how these principles ensure the safety and privacy of information. Test your knowledge on maintaining data security and the implications of breaches.

    More Like This

    Use Quizgecko on...
    Browser
    Browser