Computer Science Module 2: Network Security
32 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the purpose of well-known port numbers?

  • To provide security for network traffic
  • To identify specific service types on a host (correct)
  • To increase internet speed
  • To encrypt user data
  • Which of the following ports is used for Hypertext Transfer Protocol (HTTP)?

  • 443
  • 80 (correct)
  • 21
  • 25
  • What type of attack is characterized by overwhelming a network service to render it unusable?

  • Dictionary Attack
  • Social Engineering
  • Denial of Service (correct)
  • Packet Sniffing
  • Which of the following is a method to secure data against packet sniffing?

    <p>Implementing Secure Sockets Layer (SSL)</p> Signup and view all the answers

    Which protocol is associated with port 25?

    <p>Simple Mail Transfer Protocol (SMTP)</p> Signup and view all the answers

    What threat involves manipulating individuals to disclose sensitive information?

    <p>Social Engineering</p> Signup and view all the answers

    What type of attack uses well-known patterns of behavior to monitor network activity?

    <p>Intrusion Detection</p> Signup and view all the answers

    Which of the following protocols is used on port 443?

    <p>HTTP Secure (HTTPS)</p> Signup and view all the answers

    What is the primary purpose of network security?

    <p>To protect vital information and provide access control</p> Signup and view all the answers

    Which of the following is NOT a method of providing authentication?

    <p>Encryption</p> Signup and view all the answers

    What is a key feature of firewalls?

    <p>They filter packets based on predefined rules</p> Signup and view all the answers

    Denial of Service (DoS) attacks primarily aim to:

    <p>Disrupt the availability of resources</p> Signup and view all the answers

    Packet sniffing is primarily used for what purpose?

    <p>To analyze and capture data being transmitted</p> Signup and view all the answers

    Which of these statements accurately describes a firewall?

    <p>Acts as a single point of access to control network traffic</p> Signup and view all the answers

    Which protocol is associated with TCP attacks like spoofing?

    <p>Transmission Control Protocol (TCP)</p> Signup and view all the answers

    Which of the following best describes social engineering in the context of network security?

    <p>Manipulating individuals to gain unauthorized access to information</p> Signup and view all the answers

    What are firewalls primarily used for in network security?

    <p>Filtering packets based on rules</p> Signup and view all the answers

    Which of the following accurately describes the role of a firewall?

    <p>It limits access to a network to specific users or systems.</p> Signup and view all the answers

    Why is guaranteeing availability of resources important in network security?

    <p>It ensures services remain operational and reliable.</p> Signup and view all the answers

    What is one of the primary reasons many network applications and protocols have security problems?

    <p>Security vulnerabilities are addressed over time, making it hard to keep up.</p> Signup and view all the answers

    What kind of attack is characterized by overwhelming a service to make it unavailable?

    <p>Denial of Service</p> Signup and view all the answers

    Which of the following best describes the function of Intrusion Detection Systems?

    <p>They monitor and track network communications for unusual activity.</p> Signup and view all the answers

    What is the role of authentication in network security?

    <p>To verify the identity of users accessing resources.</p> Signup and view all the answers

    What is a common method used to protect against social engineering attacks?

    <p>Implementing strict access controls and user training.</p> Signup and view all the answers

    What is the primary role of well-known port numbers?

    <p>To identify specific applications on a host</p> Signup and view all the answers

    Which of the following protocols is used for secure communication over the internet?

    <p>SSH</p> Signup and view all the answers

    What technique involves attackers listening to unencrypted data being transmitted over a network?

    <p>Packet sniffing</p> Signup and view all the answers

    Which of the following is NOT an example of a typical TCP port?

    <p>8080</p> Signup and view all the answers

    Which type of attack aims to overload network resources to make them unusable?

    <p>Denial of Service</p> Signup and view all the answers

    What is a common solution to protect against packet sniffing attacks?

    <p>Implementing encryption protocols</p> Signup and view all the answers

    Which of the following ports is typically assigned to the Simple Mail Transfer Protocol (SMTP)?

    <p>25</p> Signup and view all the answers

    Which type of attack relies on exploiting human factors to gain sensitive information?

    <p>Social engineering</p> Signup and view all the answers

    Study Notes

    International & Access Foundation Programmes

    • Computer Science Module, Semester 2, Part 5

    Networks: Network Security

    • Overview
      • What is network security?
      • Why do we need network security?
      • Who is vulnerable?
      • Common security attacks and countermeasures
        • Firewalls & Intrusion Detection Systems
        • Denial of Service Attacks
        • TCP Attacks (Spoofing)
        • Packet Sniffing
        • Social Engineering

    Why Do We Need Security?

    • Protect vital information while allowing access to those who need it
      • Trade secrets, medical records, personal data
    • Provide authentication and access control for resources
      • Login, Passwords, Biometrics
    • Guarantee resource availability (uptime 99.995% reliability)

    Firewalls

    • Basic problem - many network applications and protocols have security problems that change over time.

    • Difficult for users to keep up with changes and keep hosts secure.

    • Solution:

      • Administrators limit access to end hosts using firewalls.
      • Firewalls are kept up-to-date by administrators.
    • Firewall analogy: A castle with a drawbridge; only one point of access to the network.

      • Can have positives and negatives
    • Firewalls can be hardware or software.

      • Some routers have firewall functionality.
      • Unix, Windows XP/7/8, and Mac OS X have built-in software firewalls.
    • DMZ (Demilitarized Zone): A segment between the Internet and the intranet, where web servers, email servers, and web proxies reside.

    • Filtering packets based on rules (packet filtering firewalls).

    • Windows 7 Default Firewall Configuration:

      • 135/tcp open loc-srv
      • 139/tcp open netbios-ssn
      • 445/tcp open microsoft-ds
      • 1025/tcp open NFS-or-IIS
      • 3389/tcp open ms-term-serv
      • 5000/tcp open UPnP

    Ports (TCP & UDP)

    • In the internet protocol suite, a port is an endpoint of communication in an operating system.

    • 1024 well-known port numbers are reserved to identify specific service types on a host.

    • A port is always associated with an IP address of a host.

    • Example:

      • http://www.example.com:8080
      • http://72.56.123.233:80/
    • List of registered ports.

    • Typical TCP Ports:

      • 21: File Transfer Protocol (FTP)
      • 22: Secure Shell (SSH)
      • 23: Telnet remote login service
      • 25: Simple Mail Transfer Protocol (SMTP)
      • 53: Domain Name System (DNS) service
      • 80: Hypertext Transfer Protocol (HTTP)
      • 110: Post Office Protocol (POP3)
      • 119: Network News Transfer Protocol (NNTP)
      • 123: Network Time Protocol (NTP)
      • 143: Internet Message Access Protocol (IMAP)
      • 161: Simple Network Management Protocol (SNMP)
      • 194: Internet Relay Chat (IRC)
      • 443: HTTP Secure (HTTPS)

    Types of Attacks

    • Intrusion Detection: Monitoring for suspicious activity on a network based on known patterns of behaviour.

    • Dictionary Attack (Brute Force): Trying passwords from a dictionary or list of common passwords.

    • Denial of Service (DoS): Making a network service unusable by overloading the server or network.

    • TCP Attacks: Attackers create IP packets and routers process them based on destination address. End-host may lie about other fields; malicious data inserted into the TCP stream, deceives the reciever that it's not from the attacker.

    • Packet Sniffing: Capturing network traffic. Affects any broadcast-based network. A host listens to the data (plain-text passwords).

      • Solution: Encrypt data (SSL for https addresses; web browser knows how to trust based on certificate authorities).

      • Secure Socket Layer (SSL) for HTTPS addresses. Web browsers know how to trust HTTPS websites based on Certificate Authorities (CAs)

      • IPSec - Internet Protocol Security (IPsec) is protocol suite for securing Internet Protocol (IP) communications by authenticating and encrypting each IP packet.

    • Social Engineering: Exploiting human psychology to gain access to sensitive information. People can be lied to, manipulated, bribed, threatened, and harmed to give up valuable information

      • Example: "Your account has been hacked, please resend..."

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Related Documents

    Description

    This quiz covers essential concepts in network security, including its definition, importance, and vulnerabilities. It also explores common security attacks, countermeasures, and the significance of firewalls in protecting sensitive information. Test your knowledge on how to secure networks effectively and understand the critical components involved.

    More Like This

    Network Security Components Quiz
    10 questions

    Network Security Components Quiz

    BrilliantTropicalIsland avatar
    BrilliantTropicalIsland
    Network Security Principles Quiz
    5 questions
    Computer Science Module: Network Security
    52 questions
    Use Quizgecko on...
    Browser
    Browser