Computer Science Module 2: Network Security

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the purpose of well-known port numbers?

  • To provide security for network traffic
  • To identify specific service types on a host (correct)
  • To increase internet speed
  • To encrypt user data

Which of the following ports is used for Hypertext Transfer Protocol (HTTP)?

  • 443
  • 80 (correct)
  • 21
  • 25

What type of attack is characterized by overwhelming a network service to render it unusable?

  • Dictionary Attack
  • Social Engineering
  • Denial of Service (correct)
  • Packet Sniffing

Which of the following is a method to secure data against packet sniffing?

<p>Implementing Secure Sockets Layer (SSL) (B)</p> Signup and view all the answers

Which protocol is associated with port 25?

<p>Simple Mail Transfer Protocol (SMTP) (B)</p> Signup and view all the answers

What threat involves manipulating individuals to disclose sensitive information?

<p>Social Engineering (A)</p> Signup and view all the answers

What type of attack uses well-known patterns of behavior to monitor network activity?

<p>Intrusion Detection (D)</p> Signup and view all the answers

Which of the following protocols is used on port 443?

<p>HTTP Secure (HTTPS) (A)</p> Signup and view all the answers

What is the primary purpose of network security?

<p>To protect vital information and provide access control (D)</p> Signup and view all the answers

Which of the following is NOT a method of providing authentication?

<p>Encryption (D)</p> Signup and view all the answers

What is a key feature of firewalls?

<p>They filter packets based on predefined rules (D)</p> Signup and view all the answers

Denial of Service (DoS) attacks primarily aim to:

<p>Disrupt the availability of resources (B)</p> Signup and view all the answers

Packet sniffing is primarily used for what purpose?

<p>To analyze and capture data being transmitted (A)</p> Signup and view all the answers

Which of these statements accurately describes a firewall?

<p>Acts as a single point of access to control network traffic (B)</p> Signup and view all the answers

Which protocol is associated with TCP attacks like spoofing?

<p>Transmission Control Protocol (TCP) (D)</p> Signup and view all the answers

Which of the following best describes social engineering in the context of network security?

<p>Manipulating individuals to gain unauthorized access to information (B)</p> Signup and view all the answers

What are firewalls primarily used for in network security?

<p>Filtering packets based on rules (D)</p> Signup and view all the answers

Which of the following accurately describes the role of a firewall?

<p>It limits access to a network to specific users or systems. (C)</p> Signup and view all the answers

Why is guaranteeing availability of resources important in network security?

<p>It ensures services remain operational and reliable. (C)</p> Signup and view all the answers

What is one of the primary reasons many network applications and protocols have security problems?

<p>Security vulnerabilities are addressed over time, making it hard to keep up. (D)</p> Signup and view all the answers

What kind of attack is characterized by overwhelming a service to make it unavailable?

<p>Denial of Service (C)</p> Signup and view all the answers

Which of the following best describes the function of Intrusion Detection Systems?

<p>They monitor and track network communications for unusual activity. (D)</p> Signup and view all the answers

What is the role of authentication in network security?

<p>To verify the identity of users accessing resources. (A)</p> Signup and view all the answers

What is a common method used to protect against social engineering attacks?

<p>Implementing strict access controls and user training. (A)</p> Signup and view all the answers

What is the primary role of well-known port numbers?

<p>To identify specific applications on a host (B)</p> Signup and view all the answers

Which of the following protocols is used for secure communication over the internet?

<p>SSH (D)</p> Signup and view all the answers

What technique involves attackers listening to unencrypted data being transmitted over a network?

<p>Packet sniffing (D)</p> Signup and view all the answers

Which of the following is NOT an example of a typical TCP port?

<p>8080 (D)</p> Signup and view all the answers

Which type of attack aims to overload network resources to make them unusable?

<p>Denial of Service (C)</p> Signup and view all the answers

What is a common solution to protect against packet sniffing attacks?

<p>Implementing encryption protocols (D)</p> Signup and view all the answers

Which of the following ports is typically assigned to the Simple Mail Transfer Protocol (SMTP)?

<p>25 (C)</p> Signup and view all the answers

Which type of attack relies on exploiting human factors to gain sensitive information?

<p>Social engineering (D)</p> Signup and view all the answers

Flashcards

Network Security

Protecting network resources from unauthorized access or attacks.

Firewall

A security system that controls network traffic by allowing or blocking specific connections.

Packet Filtering Firewall

A type of firewall that examines network packets and allows or blocks them based on pre-defined rules.

Denial-of-Service Attack

An attack that floods a network or server with traffic, making it unavailable to legitimate users.

Signup and view all the flashcards

TCP Attack (Spoofing)

A type of attack that involves faking network packets to gain unauthorized access.

Signup and view all the flashcards

Packet Sniffing

Capturing and examining network traffic to identify vulnerabilities.

Signup and view all the flashcards

Social Engineering

Manipulating individuals into revealing sensitive information or performing actions that compromise security.

Signup and view all the flashcards

Network Port

A specific address on a computer used for network communication.

Signup and view all the flashcards

Port Numbers

Reserved numbers that identify specific services on a computer.

Signup and view all the flashcards

TCP Ports

Specific port numbers used by the TCP protocol for various services.

Signup and view all the flashcards

Intrusion Detection

Monitoring network activity for suspicious behavior that could indicate an attack.

Signup and view all the flashcards

Dictionary Attack

Trying to guess passwords by using a list of common passwords.

Signup and view all the flashcards

Denial of Service (DoS)

Making a service or network unusable by overwhelming it.

Signup and view all the flashcards

HTTPS

Secure web protocol.

Signup and view all the flashcards

Trade Secrets

Confidential information that gives a company a competitive advantage, such as formulas, designs, or processes.

Signup and view all the flashcards

Medical Records

Personal health information that is confidential and protected by law.

Signup and view all the flashcards

Authentication

The process of verifying the identity of a user or device before granting access to a network or resource.

Signup and view all the flashcards

Access Control

The process of restricting access to resources based on user permissions.

Signup and view all the flashcards

Uptime

The percentage of time that a network or system is operational and available for use.

Signup and view all the flashcards

Firewall Rules

Specific instructions that define which network traffic is allowed or blocked by a firewall.

Signup and view all the flashcards

DMZ

A buffer zone between a firewall and the internet, used to isolate sensitive systems like web servers.

Signup and view all the flashcards

Packet Filtering

A firewall technique that examines individual network packets and allows or blocks them based on defined rules.

Signup and view all the flashcards

Secure Sockets Layer (SSL)

A security protocol that encrypts communication between a web server and a web browser, ensuring secure data transmission.

Signup and view all the flashcards

Study Notes

International & Access Foundation Programmes

  • Computer Science Module, Semester 2, Part 5

Networks: Network Security

  • Overview
    • What is network security?
    • Why do we need network security?
    • Who is vulnerable?
    • Common security attacks and countermeasures
      • Firewalls & Intrusion Detection Systems
      • Denial of Service Attacks
      • TCP Attacks (Spoofing)
      • Packet Sniffing
      • Social Engineering

Why Do We Need Security?

  • Protect vital information while allowing access to those who need it
    • Trade secrets, medical records, personal data
  • Provide authentication and access control for resources
    • Login, Passwords, Biometrics
  • Guarantee resource availability (uptime 99.995% reliability)

Firewalls

  • Basic problem - many network applications and protocols have security problems that change over time.

  • Difficult for users to keep up with changes and keep hosts secure.

  • Solution:

    • Administrators limit access to end hosts using firewalls.
    • Firewalls are kept up-to-date by administrators.
  • Firewall analogy: A castle with a drawbridge; only one point of access to the network.

    • Can have positives and negatives
  • Firewalls can be hardware or software.

    • Some routers have firewall functionality.
    • Unix, Windows XP/7/8, and Mac OS X have built-in software firewalls.
  • DMZ (Demilitarized Zone): A segment between the Internet and the intranet, where web servers, email servers, and web proxies reside.

  • Filtering packets based on rules (packet filtering firewalls).

  • Windows 7 Default Firewall Configuration:

    • 135/tcp open loc-srv
    • 139/tcp open netbios-ssn
    • 445/tcp open microsoft-ds
    • 1025/tcp open NFS-or-IIS
    • 3389/tcp open ms-term-serv
    • 5000/tcp open UPnP

Ports (TCP & UDP)

  • In the internet protocol suite, a port is an endpoint of communication in an operating system.

  • 1024 well-known port numbers are reserved to identify specific service types on a host.

  • A port is always associated with an IP address of a host.

  • Example:

    • http://www.example.com:8080
    • http://72.56.123.233:80/
  • List of registered ports.

  • Typical TCP Ports:

    • 21: File Transfer Protocol (FTP)
    • 22: Secure Shell (SSH)
    • 23: Telnet remote login service
    • 25: Simple Mail Transfer Protocol (SMTP)
    • 53: Domain Name System (DNS) service
    • 80: Hypertext Transfer Protocol (HTTP)
    • 110: Post Office Protocol (POP3)
    • 119: Network News Transfer Protocol (NNTP)
    • 123: Network Time Protocol (NTP)
    • 143: Internet Message Access Protocol (IMAP)
    • 161: Simple Network Management Protocol (SNMP)
    • 194: Internet Relay Chat (IRC)
    • 443: HTTP Secure (HTTPS)

Types of Attacks

  • Intrusion Detection: Monitoring for suspicious activity on a network based on known patterns of behaviour.

  • Dictionary Attack (Brute Force): Trying passwords from a dictionary or list of common passwords.

  • Denial of Service (DoS): Making a network service unusable by overloading the server or network.

  • TCP Attacks: Attackers create IP packets and routers process them based on destination address. End-host may lie about other fields; malicious data inserted into the TCP stream, deceives the reciever that it's not from the attacker.

  • Packet Sniffing: Capturing network traffic. Affects any broadcast-based network. A host listens to the data (plain-text passwords).

    • Solution: Encrypt data (SSL for https addresses; web browser knows how to trust based on certificate authorities).

    • Secure Socket Layer (SSL) for HTTPS addresses. Web browsers know how to trust HTTPS websites based on Certificate Authorities (CAs)

    • IPSec - Internet Protocol Security (IPsec) is protocol suite for securing Internet Protocol (IP) communications by authenticating and encrypting each IP packet.

  • Social Engineering: Exploiting human psychology to gain access to sensitive information. People can be lied to, manipulated, bribed, threatened, and harmed to give up valuable information

    • Example: "Your account has been hacked, please resend..."

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

More Like This

Network Security Components Quiz
10 questions

Network Security Components Quiz

BrilliantTropicalIsland avatar
BrilliantTropicalIsland
Network Security Principles Quiz
5 questions
Computer Science Module: Network Security
52 questions
Use Quizgecko on...
Browser
Browser