Podcast
Questions and Answers
What are the three key objectives in Computer Security according to the CIA triad?
What are the three key objectives in Computer Security according to the CIA triad?
What does confidentiality ensure?
What does confidentiality ensure?
Private information is only accessible to authorized people.
What does a loss of integrity refer to?
What does a loss of integrity refer to?
Unauthorized modification or destruction of information.
The key step to manage risks that involves implementing safeguards is called ______.
The key step to manage risks that involves implementing safeguards is called ______.
Signup and view all the answers
A MAC address is a unique identifier assigned to a Network Interface Card (NIC).
A MAC address is a unique identifier assigned to a Network Interface Card (NIC).
Signup and view all the answers
What part of the Ethernet frame is used for error detection?
What part of the Ethernet frame is used for error detection?
Signup and view all the answers
What is the purpose of the ARP protocol?
What is the purpose of the ARP protocol?
Signup and view all the answers
How can ARP cache poisoning occur?
How can ARP cache poisoning occur?
Signup and view all the answers
The ______ is used to improve efficiency by temporarily storing MAC addresses.
The ______ is used to improve efficiency by temporarily storing MAC addresses.
Signup and view all the answers
Study Notes
CIA Triad
- Confidentiality: Protects private information from unauthorized access; allows users control over their data; loss results in unauthorized disclosure.
- Integrity: Ensures data and systems can only be modified by authorized users; loss results in unauthorized changes or destruction of information.
- Availability: Guarantees that systems and data are accessible to authorized users without interruptions; loss results in denied access to information or systems.
Cybersecurity Framework
- Identify: Recognize security risks associated with systems, data, and assets.
- Protect: Implement security measures to safeguard critical information and services.
- Detect: Monitor to identify security events or breaches.
- Respond: Execute a response plan to address detected security incidents.
- Recover: Restore systems and data after a security event has occurred.
Data Link Layer (MAC Layer) & Attacks
- Ethernet Frame: The fundamental unit of data in Ethernet networks, containing necessary information for transmission.
- MAC Address: A unique identifier for each Network Interface Card (NIC); ensures device communication on local networks.
-
Ethernet Frame Structure:
- Destination MAC Address (6 bytes)
- Source MAC Address (6 bytes)
- Ether Type (2 bytes), indicating the protocol type (IPv4, IPv6)
- Data/Payload (46-1500 bytes), containing the actual transmitted data
- Cyclic Redundancy Check (CRC) (4 bytes), used for error detection.
MAC Address Tracking and Privacy Concerns
- Mobile devices broadcast MAC addresses while scanning for Wi-Fi, posing security risks.
- Adversaries can collect and link MAC addresses across access points to identify users, raising privacy issues.
- Hop-By-Hop Transmission: Updates the MAC address at each stage of packet routing, complicating tracking attempts by adversaries.
Address Resolution Protocol (ARP)
- Function: Maps IP addresses to MAC addresses for local network communication.
- ARP Request: Broadcasts to identify a device’s MAC address using its IP address.
- ARP Reply: Responds with the MAC address, which is saved in the ARP Cache for efficiency.
- ARP Cache: A temporary store for MAC addresses to reduce repeated requests; entries expire over time for updated accuracy.
ARP Cache Management Commands
- To view the cache:
arp -n
- To delete an entry:
sudo arp -d [IP ADDRESS]
(entry appears as incomplete until updated).
ARP Cache Poisoning
- Definition: Involves injecting fake MAC addresses into a device’s ARP cache, leading to misdirected traffic.
- Risks: Results in mapped incorrect MAC and IP addresses, leading to potential security vulnerabilities.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Description
Explore the key objectives of Computer Security in this quiz focused on the CIA Triad: confidentiality, integrity, and availability. Understand how these principles ensure the safety and privacy of information. Test your knowledge on maintaining data security and the implications of breaches.