Information Security, Cybersecurity, and Network Security

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Listen to an AI-generated conversation about this lesson
Download our mobile app to listen on the go
Get App

Questions and Answers

How does network security differ from cybersecurity?

  • Network security focuses solely on protecting data in transit, while cybersecurity includes data at rest.
  • Network security primarily addresses insider threats, while cybersecurity manages external threats.
  • Network security involves physical and software preventative measures, while cybersecurity protects systems and networks from digital attacks. (correct)
  • Network security emphasizes compliance with regulatory standards, whereas cybersecurity prioritizes incident response.

How does implementing BitLocker on a device contribute to the CIA triad?

  • It boosts integrity by offering a failsafe against data breaches, providing a reliable audit trail of access attempts.
  • It improves confidentiality by encrypting the data, restricting unauthorized access. (correct)
  • It primarily enhances availability by ensuring quick data recovery in case of system failures.
  • It ensures integrity of the data by providing a secure hashing algorithm to verify data consistency.

In the context of network security, what is the most critical implication of a 'single point of failure' (SPOF)?

  • Minor slowdown in network speeds during peak usage times.
  • Compromised confidentiality because of unauthorized access to sensitive data.
  • Complete system failure, where a single component's malfunction halts the entire network. (correct)
  • Increased vulnerability to Distributed Denial of Service (DDoS) attacks, leading to temporary service disruptions.

Which statement accurately describes the relationship between vulnerability, threat, and risk in network security?

<p>Vulnerability enables threats to realize risk. (D)</p>
Signup and view all the answers

Which of the following illustrates a primary benefit of using on-premises solutions compared to cloud solutions for data and application hosting?

<p>On-premises solutions provide greater control over physical security and data governance, allowing compliance with stringent regulatory requirements. (A)</p>
Signup and view all the answers

How do Logic Bombs operate, and what is their primary purpose in a malicious context?

<p>Logic Bombs remain dormant until a specific condition is met, then execute malicious code to sabotage the system or network. (A)</p>
Signup and view all the answers

What is the distinguishing characteristic of 'State-sponsored' threat actors in the realm of cybersecurity?

<p>They conduct cyber espionage to steal intellectual property and research data, often targeting major manufacturers and governments. (A)</p>
Signup and view all the answers

What unique characteristic distinguishes an 'ethical hacker' from other types of hackers?

<p>Ethical hackers perform security assessments with permission to proactively identify vulnerabilities. (A)</p>
Signup and view all the answers

Which of the following strategies is most effective for organizations aiming to mitigate the risks associated with Single Points Of Failure (SPOFs) in their network infrastructure?

<p>Introducing redundant devices and physical connections to critical network segments to provide failover capabilities. (D)</p>
Signup and view all the answers

What is the primary goal of 'cable tapping' (wiretapping) at Layer 1 of the OSI model, and what type of data is most vulnerable in this attack?

<p>To intercept and read raw data transmissions, making unencrypted data passing through the cables highly vulnerable. (D)</p>
Signup and view all the answers

In the context of Layer 1 attacks, how does "Jamming (DoS)" specifically compromise wireless communication, and what makes this attack challenging to mitigate?

<p>Jamming disrupts communication by sending random signals at the same frequency as the wireless network, making legitimate signals difficult to receive. (A)</p>
Signup and view all the answers

Which of the following statements accurately represents a significant challenge in implementing robust security measures for Layer 1 of the OSI model?

<p>Layer 1 security largely depends on physical security controls and network monitoring which are difficult to scale, and often get overlooked in favor of higher-layer software solutions. (A)</p>
Signup and view all the answers

What is the primary function of a 'tamper detection' mechanism in the context of Layer 1 security, and how does it protect network infrastructure?

<p>Tamper detection notifies network administrators if physical alterations to hardware are attempted, protecting unauthorized access or modifications. (B)</p>
Signup and view all the answers

How does encrypting data at the Physical Layer contribute to overall network security, and what primary protection does it offer?

<p>It makes the data unintelligible to attackers even if they intercept the transmission, improving overall security. (C)</p>
Signup and view all the answers

Why is wireless spectrum monitoring particularly critical in Layer 1 security, and what potential threats can it help detect?

<p>It detects and diagnoses frequency interference by identifying jamming attempts, alerting administrators to unauthorized devices. (C)</p>
Signup and view all the answers

Which of the following best describes the purpose and function of Dynamic ARP Inspection (DAI) on a network?

<p>DAI prevents ARP poisoning attacks by ensuring that ARP responses come from legitimate sources and match DHCP snooping bindings. (A)</p>
Signup and view all the answers

Which of the following describes a critical function of a 'DHCP Snooping Binding Database' and what security benefits does it offer?

<p>It validates IP-to-MAC address mappings to prevent IP spoofing and unauthorized DHCP server responses by ensuring consistent mappings. (A)</p>
Signup and view all the answers

What is the main purpose for configuring Root Guard on designated ports of a network switch, and what type of threat does it help mitigate?

<p>Root Guard helps maintain Spanning Tree Protocol (STP) stability by preventing unauthorized switches from becoming the root bridge. (D)</p>
Signup and view all the answers

Why is it important to use PortFast in conjunction with BPDU Guard on access ports connected to end-user devices?

<p>PortFast reduces the chance of temporary forwarding loops, and BPDU Guard prevents unauthorized switches from influencing the STP topology. (D)</p>
Signup and view all the answers

What is the fundamental security risk associated with failing to change the native VLAN on a trunk port, and how can this vulnerability be exploited?

<p>A static native VLAN enables VLAN hopping attacks, and devices from one VLAN inject traffic into another segment by exploiting trunk settings. (D)</p>
Signup and view all the answers

What is the key operational distinction between 'Control Plane Policing (CoPP)' and a standard Access Control List (ACL) in a network security context?

<p>ACLs filter data plane traffic, while CoPP protects the control plane from being overwhelmed by traffic. (B)</p>
Signup and view all the answers

What unique security benefits does 'Scrypt' offer compared to an 'MD5 hash' when securing passwords on network devices?

<p>Scrypt incorporates key derivation and adaptive salting, decreasing the resources an attacker needs to decrypt the password, while MD5 is less robust to modern attacks. (D)</p>
Signup and view all the answers

How does a MAC address flooding attack compromise the security and performance of a network switch?

<p>It fills the switch's MAC address table with bogus entries, causing the switch to broadcast all traffic, similar to a hub, thus compromising confidentiality. (A)</p>
Signup and view all the answers

What are the two variations of spanning-tree attacks?

<p>Root bridge and BPDU poisoning attacks (B)</p>
Signup and view all the answers

Why is storm control important?

<p>Storm control prevents switches from hogging all the memory and flooding the network with bad traffic (E)</p>
Signup and view all the answers

Which can best block VLAN hopping?

<p>Disabling auto trunking (B)</p>
Signup and view all the answers

What are layer 2 attack?

<p>VLAN Hopping Attack ,MAC address Flooding Attack (C)</p>
Signup and view all the answers

What is the default type for console encryption?

<p>Type 7 Password (B)</p>
Signup and view all the answers

The switch is looping what is the solution?

<p>configure spanning tree bDPU (C)</p>
Signup and view all the answers

An engineering workstation is being denied Internet access. The workstation is connected to a switch on the same VLAN. What configuration is needed on the access port?

<p>portfast bpdu (E)</p>
Signup and view all the answers

What is the best way for an organization to test network device with no outside connections?

<p>Console Port (A)</p>
Signup and view all the answers

Which one of those items does the storm control is not?

<p>ARP (A)</p>
Signup and view all the answers

How can you protect from man in the middle attack?

<p>DAI (C)</p>
Signup and view all the answers

Which of these protocols are the most secure remote access?

<p>SSH (C)</p>
Signup and view all the answers

One computer has connected one inexpensive unmanaged switch then the network will be down, what has happened?

<p>Network Loop (D)</p>
Signup and view all the answers

Which is/are the main functions of Information Security?

<p>All of the above except D. (E)</p>
Signup and view all the answers

In the context of cybersecurity practices, what does the CIA Triad represent?

<p>B&amp;D (C)</p>
Signup and view all the answers

Under which of the following scenarios would cloud-based cybersecurity solutions be most advantageous compared to on-premise solutions?

<p>B&amp;D (D)</p>
Signup and view all the answers

What is the definition of “risk”?

<p>A potential for loss, compromise, damage, destruction, or other negative consequence to an organization's asset. (A)</p>
Signup and view all the answers

Signup and view all the answers

Flashcards

Information Security

Processes to protect confidential data from unauthorized modification or destruction.

Cybersecurity

Protecting digital systems, networks, and data from cyber attacks.

Network Security

Securing network infrastructure from unauthorized access, misuse, malfunction, modification, or destruction.

Availability

Ensuring data is accessible and available when needed.

Signup and view all the flashcards

Confidentiality

Protecting sensitive information from unauthorized access or disclosure.

Signup and view all the flashcards

Integrity

Maintaining the accuracy and completeness of information.

Signup and view all the flashcards

Asset

Something of value that an organization wants to protect.

Signup and view all the flashcards

Vulnerability

A weakness or flaw in a system that could be exploited.

Signup and view all the flashcards

Exploit

A method or tool used to take advantage of a vulnerability.

Signup and view all the flashcards

Threat

Anything that could potentially harm an asset.

Signup and view all the flashcards

Attack

An action taken by an attacker to harm an asset.

Signup and view all the flashcards

Risk

The potential negative impact resulting from a threat exploiting a vulnerability.

Signup and view all the flashcards

Countermeasure

An action taken to reduce or eliminate a threat or vulnerability.

Signup and view all the flashcards

On-Premises

Organization hosts infrastructure locally

Signup and view all the flashcards

Cloud Solutions

Organization pay a subscription to a vendor for its infrastructure

Signup and view all the flashcards

Malware

Malicious software designed to damage or disrupt systems.

Signup and view all the flashcards

Virus

Malicious code that replicates and spreads to other files or systems.

Signup and view all the flashcards

Worm

Self-replicating malicious code that spreads over a network.

Signup and view all the flashcards

Trojan

Malicious code disguised as legitimate software to gain access.

Signup and view all the flashcards

Rootkit

Software used to hide other malware.

Signup and view all the flashcards

Spyware

Software that secretly monitors user activity and collects data.

Signup and view all the flashcards

Adware

Software that displays unwanted advertisements.

Signup and view all the flashcards

Scareware

Malicious software designed to trick users into buying fake software.

Signup and view all the flashcards

Botnet

Network of infected computers controlled by an attacker.

Signup and view all the flashcards

Logic Bomb

Malicious code that executes when a specific condition is met.

Signup and view all the flashcards

Keylogger

Software that records keystrokes to steal sensitive information.

Signup and view all the flashcards

Ransomware

Malware that encrypts user data and demands a ransom for decryption.

Signup and view all the flashcards

Threat Actors

Individuals or groups responsible for security incidents.

Signup and view all the flashcards

Script Kiddies

Inexperienced hackers who use existing tools to attack systems.

Signup and view all the flashcards

Organized Crime Groups

Groups that steal information for financial gain.

Signup and view all the flashcards

State Sponsors

Nations that steal data, including intellectual property.

Signup and view all the flashcards

Hacktivists

Those who carrying out cyberattacks for a social or political cause.

Signup and view all the flashcards

Terrorist Groups

Those targeting political or religious beliefs

Signup and view all the flashcards

Hacker

A computer enthusiast.

Signup and view all the flashcards

White hat hacker

Performs ethical hacking

Signup and view all the flashcards

Black hat hacker

Performs illegal activities.

Signup and view all the flashcards

Gray hat hackers

May follow the law.

Signup and view all the flashcards

Single point of Failure

A point that would stop it from working.

Signup and view all the flashcards

Redundant links

The use of multiple network links to ensure that data can proceed even in a failure.

Signup and view all the flashcards

Cable Tapping

Hack the physical connection to a network.

Signup and view all the flashcards

Jamming

Wireless signal interference.

Signup and view all the flashcards

Study Notes

Lesson 1

  • The lesson covers Information Security, Cybersecurity, and Network Security, CIA Triad, Common Network Security Terms, On-premise & Cloud Solutions, Malware types, Threat actors, Increasing Network Availability and Project topics

Misunderstanding Information Security, Cybersecurity, and Network Security

  • Information security applies processes and methodologies designed to protect confidential, private, and sensitive data in any form from unauthorized access, use, misuse, disclosure, destruction, modification, or disruption
  • Cybersecurity refers to the practice of protecting systems, networks, and programs from digital attacks
  • These attacks aim to access, change, or destroy sensitive information, extort money, or interrupt normal business processes
  • Network security involves physical and software preventative measures to protect networking infrastructure from unauthorized access, misuse, malfunction, modification, destruction, or improper disclosure
  • This creates a secure platform for computers, users, and programs to perform permitted critical functions

CIA Triad

  • It involves three basic components and goals of network security: Confidentiality, Integrity, and Availability

Confidentiality

  • This means identifying what information should be controlled, who is authorized to access it, and controlling access to ensure only authorized individuals can access the information
  • Confidential data examples include bank and credit card details, criminal records, patient health records, and military secrets
  • Encryption tools such as Bitlocker, AxCrypt, are used when information must be stored, which enhances confidentiality

Integrity

  • This stands as the second goal of network security, and means the data provided must be accurate, consistent, and unaltered
  • Only authorized people can change it

Availability

  • It stands as the third goal of network security, requiring that systems, applications, and data are available to authorized users when needed
  • Denial-of-Service (DoS) or Distributed DoS attacks are the most common threats to availability
  • Access controls, monitoring, and data redundancy are recommended to ensure resource availability

Common Security Terms

  • Asset refers to anything of value to an organization, such as properties, vehicles, equipment, plants, buildings, employees, computers, data, and intellectual property
  • Protecting assets represents the primary function of security, whether physical or network-based
  • Vulnerability defines a weakness in a system that threat actors can exploit for unauthorized access
  • Exploit represents a method or tool that an attacker uses to leverage a vulnerability and damage a system

Threat

  • It refers to any potential danger to an asset, which can be triggered accidentally or intentionally

Attack

  • It refers to the action taken by an attacker to harm an asset

Risk

  • It is defined as the potential for loss, compromise, damage, destruction, or other negative consequences to an organization's asset
  • Risk is expressed as Risk = Asset + Threat + Vulnerability

Countermeasure

  • It refers to an action initiated by an organization, typically by security professionals, to mitigate a threat

On-Premise & Cloud Solutions

  • An on-premises setup involves an organization hosting all its IT infrastructure in its offices, such as in a Data Center (DC)
  • The IT staff is responsible for installing, running, and controlling all system and network services, with software and technological assets located on physical servers within the DC
  • Pros: security, control, customizability, and no constant need for internet access
  • Cons: High upfront and greater complexity, less flexibility, and longer implementation times
  • Cloud hosting occurs on servers maintained by a vendor, who serves as the hosting company
  • Cloud computing is an option to on-premises solutions and is often accessed via the Internet, and Microsoft Azure is an example
  • Pros: disaster recovery, accessibility, cost effectiveness, and scalability
  • Cons: Lack of control, internet dependency, privacy concerns, and fixed contract

Malware Types

  • Malware refers to any file, code, or app designed to infect, explore, and steal data, and is an inclusive term for all malicious software
  • Virus is defined as malicious software attached to an executable file, designed to destroy systems or data
  • Worm is defined as malicious software with the ability to replicate itself and spread over a computer network
  • Trojan pretends to be a regular program and contains payloads that provide a backdoor for unauthorized access to a system or network
  • RAT (Remote Access Trojans), Security-Software disable Trojans, Data-hiding Trojans, and DOS (Denial of Service) Trojans are examples
  • Rootkit is a collection of stealth software designed to permit malware, hiding its presence

Additional Malware Types

  • Spyware is defined as a computer network term for malware that monitors computer activities to collect private data
  • Adware, short for Advertising-Supported Malware, automatically generates revenue by serving ads to device users
  • Scareware represents tricks that involves deceiving users into downloading useless software like registry cleaners or firewall applications

More on Malware

  • Botnet is defined from two words - Bot (short for Robot) and Net (for Network) and represents a network of infected computers used by malware to spread.
  • Logic Bomb is defined as malware triggered by launching an application, or when a certain date and time is reached, where it can embed an arbitrary code or fake application.
  • Key Loggers record user's keyboard inputs, particularly targeting credentials
  • Ransomware encrypts user data and demands decrypting key payment, with a recent example being the WannaCry attack

Threat Actors

  • Threat actors refer to those who execute attacks and cause security incidents, and can be different groups or individuals like Script kiddies, Organized crime groups, State sponsors and governments, Hacktivists and Terrorist groups

Script Kiddies

  • This describes inexpert people who use existing scripts\tools to hack computers and networks, but lack the expertise to write their own

Additional Threat Actors

  • Organized crime groups main goal is to steal information, scam people, and make money.
  • State sponsors and governments are interested in stealing data, including intellectual property, research-and-development, and they are from major manufacturers and governments
  • Hacktivists use cybersecurity attacks to promote a social or political cause.
  • Terrorist groups have religious and/or political motivations

Hackers

  • It is defined as a person who enjoys understanding the workings of a system and continues to hack to learn everything about it
  • Cracker refers to a criminal hacker
  • Ethical hacker was coined to distinguish the good guys from the bad guys

Hacker Classifications

  • White hat hackers utilize ethical hacking methods to help companies and organizations secure their systems
  • Black hat hackers are those who perform illegal activities like organized crime
  • Gray hat hackers follow the law generally, but sometimes follow the darker side of black hat hacking

Increasing Network Availability

  • A single point of failure (SPOF) occurs when one component's failure stops the entire system from working
  • To prevent SPOFs, networks need increased maintenance and redundant devices
  • Fault Tolerance Systems: a network constructed specifically to prevent SPOFs; with multiple devices and connections (redundancy) the server infrastructure is protected from the failure of any one section

Hardware Redundancy

  • It include redundant wide are network links for backup/failover as well as redundant power supply

Project Topics & Structure

  • Included project topics: SQL Database Injection Attack, XSS - Cross Site Script Attack, Phishing Social Engineering Attack, Buffer Overflow Attack, Path Traversal Attack, MITM – Man-in-the-Middle Attack, and DOS - Denial of Service Attack
  • The project will be presented in the semester’s last lesson
  • It involves groups investigating a topic and preparing five slides for presentation, with practical related job being considered as extra points

Lesson 2

  • This lesson covers Layer 1 attacks in the OSI model

OSI Model Layer 1 Attacks

  • Physical Layer or Layer 1 is the first layer and handles actual hardware and physical connections that enable communication
  • Layer 1 (physical layer) attacks target the network infrastructure, can case disruptions, data lossor complete system failure
  • Cable tapping (wiretapping), jamming (DoS), physical destrcution of hardware, eavesdropping(sniffing) on wireless signal, rogue devices, MITM attack on physical links

Cable Tapping/Wiretapping

  • It involves physically accessing network cables to intercept data, like Ethernet or fiber optic
  • Since data can intercepted here, raw data transmission occurs
  • Any data sent by cables is intercepted

Jamming (DoS)

  • It interferes with wireless communication by sending signals that cause noise
  • This impacts devices the same frequency as Wi-Fi networks and thus, devices will lose connection

Physical Destruction of Hardware

  • It involves physically damaging or destroying network devices, like routers and switches
  • An attacker might destroy cables, cut fiber optic lines, or damage hardware critical for a network's infrastructure
  • The network then becomes inoperable

Eavesdropping (Sniffing)

  • It is where an attacker intercepts the wireless communication to capture sensitive information
  • Attackers use sniffing tools to capture and analyze packets transmitted over the air, in weakly secured Wi-Fi

Rogue Devices

  • It is an unauthorized device that connects physically/wirelessly, such as a malicious device or rogue Wi-Fi access point
  • They may attempt to intercept data, modify data, infect systems, or damage the network via malware

MITM Attacks

  • It's where the attacker physically inserts themselves between 2 communicating device at the physical layer
  • By compromising with cables or wireless channels, they capture and alter messages without detection

Mitigation of Layer 1 OSI Model Attacks

  • Security measures that you can undertake as countermeasures to prevent Layer 1 intrusions: Securing access, cable security, encryption, ensuring secure & isolated wireless etc

Security Access

  • It requires physical network equipment in locked rooms/data centers with restricted personnel and strong physical access control, like ID badges

Cable Security

  • It inolves using conduits/cable trays to protect cables from tampering/burial cables underground to make tampering difficult. tamper evident seals detect any access

Data and Wireless Encryption

  • It involves encrypting Layer 3 data even when Layer 1 focuses on raw transmission
  • It requires use of reliable wireless encryption standards like WPA3, MAC address filtering, to avoid rogue devices

Network Monitoring

  • Use systems to monitor for unauthorized jamming or devices. Monitor for disruptions, as this is an indicator of jamming attack

Device and Data Inspections

  • Utilize detection tools and have regular scans for rogue switches. and physical audits+inspections for malicious connections.

Response, Redundancy, Recovery

  • Establish a plan to respond to breaches, with backup systems. Ensure to have redundant channels, and backups to ensure network operations in face of attacks

Network segmentation, Core Access

  • Segment critical infrastructure, to minimize an attacker’s impact if they gain single entry. Utilize failover solutions to backup data

Layer 3

  • Its the (network layer) attack that can happen if attackers insert themselves to communication devices to read and alter information. The mitigation methods inclue: real time alerting, video surveillance over cables

Lesson 3

  • The lesson covers OSI Model Layer 2 Data Link attacks such as MAC address Flooding, DHCP Starvation and ARP Spoofing Attacks

MAC address Flooding Attack

  • In this attack, the Switch CAM Table becomes full from fake source addresses. This occurs due to flooded ethernet frames/different MAC addresses, flooding the table
  • As a result, the switch malfunctions and traffic is broadcast to all
  • A protection is to setup port security to a specific switch, to only allow certain MAC addressed on that switch
  • Actions can range from messages to effectively shutting down the interface

Port Security Summarization

  • Examines if frames received have issues and defines a maximum number of unique source MAC addresses, that can cause errors

Port Security Configuration

  • Steps to configure port security involve the following:
  • Setting switch to static/trunk Interface using switchport mode access
  • Enabiling Port Security using switchport port-security and maximum number of allowed MAC addresses
  • Setting violation mode

Port Security Modes

  • There are 3 options you can chose for port security and these modes can affect dropping
  • Protect - Drops without logging it
  • Restrict - Drops and notes with Simple Network Maintenance Protocol trap
  • Shutdown - Puts the switch interface in an error disable state

DCHP Starvation Attack

  • Refers to a malicious device where a large number of DCHP are requested in order to exhaust addresses
  • This causes legitimate users to lose access and results in further exploits and attacks
  • mitigation: Implement IP-MAC binding to prevent requests and minimizing the lease time

DHCP Snooping

  • It’s a feature used to protect against attacks, by monitoring DHCP traffic - to make sure only devices act as DCHP
  • It involves setting trusted vs untrusted ports, including monitoring DCHP information -Trusted ports are ports by servers are connected and only replies are accepted
  • Untrusted ports are regular connections by end users, where only requests are sent

ARP Spoofing\Poisoning Attacks

  • Refers to fake ARP messages sent over a network that associates another’s MAC address
  • This leads to mitm attacks, Denial of Service, and traffic redirection

Results of ARP Poisoning Attacks

  • MITM attacks - the attacker can intercept data and alter it
  • Denial of Service - Attacker can cause devices to stop communicating from legitimate devices - leading to a DoS effect Traffic Redirection - Attackers can capture sensitive and personal information

ARP dynamic inspection and Config

  • ARP dynamic Inspection is a security feature used to prevent DHCP attacks. IT needs snooping to verify ip-mac addresses

Lesson 4

  • Covering data link layer 2 attacks such as Root Bridge Spoofing attacks

Root Bridge Spoofing Attack

  • This is where an attacker sends out lower priority fake BPDU attacks and causes disruption
  • The protection from this: utilize port fast, and STP guard, filtering etc

PortFast Considerations

  • portfast is enabled on ports where there is no STP device or network
  • when portfast is properly in place. The switch moves to STP forwards for the NIC for normal fast traffic

Spanning Tree

  • Attackers who can manipulate ports with low values become root switch and intercept data

BPDU Guard

  • In the event of BPDU being received help prevent problems by only using access ports that connect 2 user devices, as the local switch can disable what is causing that BPDU

Root Guard, traffic and BPDU Filters

  • It is a security feature where it prevents unauthorized switches but also allows BPDUs from legitimate root switches while filtering unnecessary BDPU transmissions.
  • It is where there is one-way loop as a connector is transmitting but failing to receive connector data

Loop Guard

  • One of the solutions from previous side, that stops traffic from illegitimate sources

Lesson 5

  • This lesson covers the following Data Link Layer 2 attacks: VLAN Hopping attacks, Storm Controls as well as looking at Network planes

VLAN Hopping attacks

  • In this attack, the attacker attempts to hop from 1 VLAN to unauthorized VLANs
  • there are 2 kinds of attacks involving: spoofing and double tagging

Switch Port Spoofing

  • Where attacker pretends to be another switch by sending dynamic trunking potrol to estabilish a trunk link
  • This allows attacker to send\receive VLANS

Mitigations

  • It is best to disable Dynamic Trunking Protocol, implement private VLANS,

Double Tagging

  • It is where the attacker sends double tagged VLANs, but then is forwarded from the inner VLAN to another

Storm Control

  • It is used as a traffic management on ports, that will limit potential unicasts, multi casts and broadcasts
    • Packets received to the port
  • By default it automatically is diabled but can be set as % bandwidth or PPS by setting storm control actions to shutdown which stop attacks in the event they occur

Network Planes

  • Modern networking devices are divided into 3 planes or layers
  • Management - Administration access to devices e.g. connecting with SSH
  • Control - Handled logic for traffic - Protocols for routing such as Open Shortest Path First (OSPF), Border Gateway Protocol (BGP), Enhanced Interior Gateway Routing Protocol (EIGRP)
  • Data Layer- where actual use traffic is done e.g. with Internet Protocol forwarding and network address translation

Network Ports and Security

  • Console - Port used on device in order to connect even without an network
  • To connect to devices with protocols such as SSH is what is called “in band”, where console cable use is called “ out band”

Passwords

  • Passwords are shown a key aspect to use for modern devices. These types relate to the strength of the passcodes; here are the various types and their strengths
  • Plain has no strength and should not be used. In the event you cannot configure password to type 7 and stronger they are easily reversed

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

More Like This

Use Quizgecko on...
Browser
Browser