Network and Distributed Systems Security

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Listen to an AI-generated conversation about this lesson
Download our mobile app to listen on the go
Get App

Questions and Answers

What is the primary function of a network?

  • To provide power to devices
  • To isolate devices from external threats
  • To store data securely
  • To connect two or more devices for communication (correct)

Which of the following describes a potential vulnerability in data communications?

  • Data is compressed for faster transfer
  • Data travels on a wire or wirelessly (correct)
  • Data is stored on a secure server
  • Data is encrypted before transmission

What is 'packet sniffing' in the context of network security?

  • Combining multiple packets into one
  • Examining each packet as it goes by (correct)
  • Securing packets using encryption
  • Compressing packets for faster transmission

Which of the following best describes the vulnerability associated with 'radiation' in network transmission?

<p>Wires radiate signals that an intruder can read through inductance (C)</p>
Signup and view all the answers

Which type of cable is difficult to tap without being detected?

<p>Optical fiber (B)</p>
Signup and view all the answers

Why are microwave communications more accessible to outsiders?

<p>Broadcast through the air (A)</p>
Signup and view all the answers

What is a key weakness of satellite communication regarding security?

<p>A wide broadcast footprint (C)</p>
Signup and view all the answers

What is the primary function of a MAC address?

<p>Unique identifier for a network interface card (B)</p>
Signup and view all the answers

What does the term 'eavesdropping' refer to in network security?

<p>Interception of communications (D)</p>
Signup and view all the answers

What is a Denial of Service (DoS) attack?

<p>An attempt to defeat availability (A)</p>
Signup and view all the answers

What does a 'Smurf attack' involve?

<p>Spoofing the victim's address and sending ping packets in broadcast mode (C)</p>
Signup and view all the answers

In a SYN flood attack, what is the attacker primarily trying to do?

<p>Fill the SYN_RECV queue (C)</p>
Signup and view all the answers

What is the main goal of a 'teardrop' attack?

<p>Cause the recipient's operating system to lock up (C)</p>
Signup and view all the answers

What are compromised machines in a DDoS attack often called?

<p>Bots or zombies (B)</p>
Signup and view all the answers

What is a 'botnet'?

<p>Networks of bots (D)</p>
Signup and view all the answers

What is wiretapping?

<p>Intercept communications. (B)</p>
Signup and view all the answers

What does 'inductance' allow an intruder to do?

<p>To steal data from a wire without physical contact (C)</p>
Signup and view all the answers

What is impersonation in network security?

<p>Pretending to be someone or something (B)</p>
Signup and view all the answers

Which of the following is an example of a message integrity violation?

<p>Changing the content of a message (D)</p>
Signup and view all the answers

What is one reason why networks have security problems?

<p>Anonymity - attacker can mount an attack without touching the system (D)</p>
Signup and view all the answers

A network always involves a single client interacting with a single server.

<p>False (B)</p>
Signup and view all the answers

Data communications are only vulnerable when transmitted wirelessly.

<p>False (B)</p>
Signup and view all the answers

Optical fiber cables are easily tapped without detection using inductance.

<p>False (B)</p>
Signup and view all the answers

A MAC address is a unique identifier for a network interface card.

<p>True (A)</p>
Signup and view all the answers

Wires do not radiate signals, making them secure from eavesdropping.

<p>False (B)</p>
Signup and view all the answers

Microwave transmissions are harder to intercept than cable transmissions.

<p>False (B)</p>
Signup and view all the answers

Satellite communication signals are only accessible to the intended receiver.

<p>False (B)</p>
Signup and view all the answers

In a sequencing attack, packets arrive in the correct order.

<p>False (B)</p>
Signup and view all the answers

Eavesdropping and wiretapping are forms of interception.

<p>True (A)</p>
Signup and view all the answers

SSID is a string to identify a wired access point.

<p>False (B)</p>
Signup and view all the answers

Losing network services is called Denial of Service.

<p>True (A)</p>
Signup and view all the answers

A smurf attack directly uses the attacker's IP address.

<p>False (B)</p>
Signup and view all the answers

In a SYN flood attack, the attacker's identity is easily traced.

<p>False (B)</p>
Signup and view all the answers

DDoS attacks are difficult to launch.

<p>False (B)</p>
Signup and view all the answers

Data corruption can only be caused by hackers.

<p>False (B)</p>
Signup and view all the answers

A 'botnet' is a network of compromised computers used to launch attacks.

<p>True (A)</p>
Signup and view all the answers

A replay attack involves legitimate data being intercepted and reused.

<p>True (A)</p>
Signup and view all the answers

Routing always follows a single, predetermined path in a network.

<p>False (B)</p>
Signup and view all the answers

Impersonation involves pretending to be someone else.

<p>True (A)</p>
Signup and view all the answers

In link encryption, data is decrypted only at the final destination.

<p>False (B)</p>
Signup and view all the answers

What is a common contributor to security problems in organizations?

<p>Low awareness of security problems (C)</p>
Signup and view all the answers

What can result because of lack of unique responsibility for a network resource?

<p>Neglect and increased susceptibility to security breaches (B)</p>
Signup and view all the answers

What can be the consequence of not having audit trails in place?

<p>Difficult to trace security incidents (A)</p>
Signup and view all the answers

Which of the following is considered an environmental attack on network systems?

<p>Power outages (B)</p>
Signup and view all the answers

What's a potential risk of using software that's poorly designed or inadequately tested?

<p>Vulnerabilities that can be exploited (C)</p>
Signup and view all the answers

How does the high portability of devices impact security?

<p>Expands the attack surface (A)</p>
Signup and view all the answers

What is a risk that can arise from combining multiple duties for one individual without proper segregation?

<p>Increased risk of insider threats (D)</p>
Signup and view all the answers

Which the following is a class of security measures?

<p>Issues Addressed by Procedures for Use (C)</p>
Signup and view all the answers

What is the purpose of policies for user authentication and access control?

<p>To mitigate human errors (B)</p>
Signup and view all the answers

Why should users not leave printers unattended when printing sensitive output?

<p>To prevent unauthorized access (A)</p>
Signup and view all the answers

What is the purpose of securing equipment housing hardware components?

<p>To prevent physical access by the unauthorized (C)</p>
Signup and view all the answers

What do software controls involve for security?

<p>Deploying security features in software (A)</p>
Signup and view all the answers

What should users do regarding software and potential threats?

<p>Utilize software with a full understanding of its potential threats (A)</p>
Signup and view all the answers

Why is securing a Wide Area Network (WAN) complicated?

<p>Due to distance and size (C)</p>
Signup and view all the answers

What can the distributed nature of ownership in WAN deployments lead to?

<p>Challenges in defining consistent security policies (A)</p>
Signup and view all the answers

What is a key feature of an incident handling plan?

<p>Users should know what is suspicious behavior and to whom to report it (B)</p>
Signup and view all the answers

What is the purpose of the CRACK tool?

<p>To check password strength (C)</p>
Signup and view all the answers

What does Tripwire monitor?

<p>Changes in critical system files (D)</p>
Signup and view all the answers

What is the main purpose of COPS?

<p>To evaluate the security posture of UNIX-based systems (C)</p>
Signup and view all the answers

What does SATAN do?

<p>Analyzes network security (B)</p>
Signup and view all the answers

Low awareness of security problems is a contributor to security challenges.

<p>True (A)</p>
Signup and view all the answers

Unique responsibility for security ensures collective diffusion of accountability.

<p>False (B)</p>
Signup and view all the answers

Audit trails hinder effective threat detection.

<p>False (B)</p>
Signup and view all the answers

Environmental attacks can compromise data integrity and network security.

<p>True (A)</p>
Signup and view all the answers

Regular backups decrease the risk of data loss in the event of system failures.

<p>False (B)</p>
Signup and view all the answers

There are four classes of security measures.

<p>False (B)</p>
Signup and view all the answers

Security measures encompass issues addressed by procedures for use.

<p>True (A)</p>
Signup and view all the answers

Leaving printers unattended reduces the risk of unauthorized access to printed documents.

<p>False (B)</p>
Signup and view all the answers

Practices such as separation of authority should be implemented to centralize responsibilities.

<p>False (B)</p>
Signup and view all the answers

Security boards provide additional layers of protection.

<p>True (A)</p>
Signup and view all the answers

Hardware controls are aimed to disregard critical assets.

<p>False (B)</p>
Signup and view all the answers

It is recommended to use software from dubious sources.

<p>False (B)</p>
Signup and view all the answers

Wide Area Networks (WAN) are harder to secure due to distance and size.

<p>True (A)</p>
Signup and view all the answers

COPS is a collection of password cracking tools.

<p>False (B)</p>
Signup and view all the answers

System administrators should develop an incident handling plan.

<p>True (A)</p>
Signup and view all the answers

Tripwire is a tool to use before a suspected penetration.

<p>False (B)</p>
Signup and view all the answers

CRACK can identify users with weak passwords.

<p>True (A)</p>
Signup and view all the answers

SATAN is a collection of network analysis tools.

<p>True (A)</p>
Signup and view all the answers

The Computer Emergency Response Team was created by the US Department of Energy.

<p>False (B)</p>
Signup and view all the answers

Security planning starts with risk analysis.

<p>True (A)</p>
Signup and view all the answers

Flashcards

What is a network?

Two devices connected by hardware and software for communication.

What is packet sniffing?

Examining each packet as it goes by in a network.

What is radiation in network security?

Wires radiate signals readable by an intruder.

What is cable splicing?

Cutting and splicing a cable to receive a copy of the data.

Signup and view all the flashcards

What is a MAC address?

A physical address of a network interface card.

Signup and view all the flashcards

What is a network protocol?

A language or set of conventions for two computers to interact.

Signup and view all the flashcards

What is routing?

Direct traffic on a path that leads to a destination.

Signup and view all the flashcards

What is a port?

A number associated with an application program.

Signup and view all the flashcards

What is a replay attack?

Illegitimate data is intercepted and reused.

Signup and view all the flashcards

What is interruption?

Loss of service or Denial of Service.

Signup and view all the flashcards

What is a SYN flood attack?

Victims filling their SYN_RECV queue.

Signup and view all the flashcards

What is a Teardrop attack?

Sending overlapping fragments of data that cannot be reassembled.

Signup and view all the flashcards

What is traffic redirection?

Misleading routers for disrupting network communication.

Signup and view all the flashcards

What are botnets?

Networks of bots, are used for massive DoS attacks.

Signup and view all the flashcards

What is Denial of Service?

Preventing any part of a telecommunications system from functioning.

Signup and view all the flashcards

What is link encryption?

Data is encrypted just before being placed on physical communication links.

Signup and view all the flashcards

What is end-to-end encryption?

Provides security from one end of a transmission through the other.

Signup and view all the flashcards

What is KDC in Kerberos?

A trusted Key Distribution Center to authenticate users and services.

Signup and view all the flashcards

What is Kerberos?

A central server provides authenticated tokens.

Signup and view all the flashcards

What is hacking?

A series of actions attacking weaknesses in a computer system.

Signup and view all the flashcards

What is cable interception?

Signals in ethernet or other local networks are vulnerable to interception.

Signup and view all the flashcards

What is Microwave communication?

Broadcast through the air, making them more accessible to outsiders.

Signup and view all the flashcards

What is a Botnet?

A network of compromised computers controlled by a malicious actor.

Signup and view all the flashcards

What is wiretapping?

The unauthorized interception of communications, such as phone calls, emails, or network traffic.

Signup and view all the flashcards

What is Impersonation?

A security threat where an attacker pretends to be someone else.

Signup and view all the flashcards

Message Confidentiality Violation

When data is accessed by unauthorized individuals

Signup and view all the flashcards

Message Integrity Violation

The process of altering or corrupting transmitted data.

Signup and view all the flashcards

Low Awareness of Security Problems

Misconception that security is simple. This underestimates implementing robust measures.

Signup and view all the flashcards

No Unique Responsibility

Multiple users sharing resources diffuses responsibility, causing neglect.

Signup and view all the flashcards

No Audit Trails

Lacking mechanisms that hinders threat detection and response.

Signup and view all the flashcards

Environmental Attacks

Vulnerability exists through power outages, natural disasters and hardware theft.

Signup and view all the flashcards

No Backups

Leads to data loss during system failures, malware attacks.

Signup and view all the flashcards

Amateur Quality Software

Vulnerabilities & bugs exploited by malicious actors that pose a significant security risk.

Signup and view all the flashcards

High Portability

Portable devices and remote access expand the attack surface.

Signup and view all the flashcards

Combination of Duties

Increases insider threats, conflicts, and unauthorized access.

Signup and view all the flashcards

Procedures for Use

User authentication, access control, data handling, and incident response.

Signup and view all the flashcards

Issues Addressed by Hardware Controls

Physical hardware secured to prevent unauthorized access.

Signup and view all the flashcards

Issues Addressed by Software Control

Security software prevents, detects and mitigates security risks.

Signup and view all the flashcards

CRACK

Collection of password checking tools to assess password strength.

Signup and view all the flashcards

Tripwire

IDS monitoring critical files & alerting administrators to changes.

Signup and view all the flashcards

COPS

Assess security posture of UNIX systems by identifying potential flaws.

Signup and view all the flashcards

SATAN

Scans networks for vulnerabilities and misconfigurations to prevent attacks.

Signup and view all the flashcards

Off-site Backup

Process of backups and storing data at an offsite location to ensure data integrity.

Signup and view all the flashcards

Networked Storage

Offers storage space remotely, separating physical location of storage.

Signup and view all the flashcards

Hot Site

Facility to install/operate a computing system to ensure minimal downtime.

Signup and view all the flashcards

Usefulness

A clear, concise and direct policy to prevent being implemented incorrectly.

Signup and view all the flashcards

Revolving Backups

Maintaining backups while replacing the oldest with new ones.

Signup and view all the flashcards

Low awareness

Misconception using a calculator: Underestimating complexity, thus risking sensitive information.

Signup and view all the flashcards

Secure physical equipment

Securing hardware prevents unauthorized physical access to vital components

Signup and view all the flashcards

Incident Handling Plan

Developing an incident handling plan to address suspicious behavior for system administrators.

Signup and view all the flashcards

Risk analysis

A process to determine exposures, improve bases for decisions and their likely harm:

Signup and view all the flashcards

Security Plan

A document describing how an organization addresses its security needs.

Signup and view all the flashcards

Security Policy Considerations

Key considerations, defining rules, standards for protecting assets, managing risks, and compliance.

Signup and view all the flashcards

Cold Site

A facility with power and cooling but requiring you to install all hardware and software.

Signup and view all the flashcards

File Copy

A backup that make a copy of all or part of a file to assist in recovering lost data.

Signup and view all the flashcards

Selective Backup

Save only the files that have been modified or created since the last backup.

Signup and view all the flashcards

Security policy breadth

A security policy must be sufficiently broad to accommodate new situations or scenarios.

Signup and view all the flashcards

Security policy durability

Policies must adapt over time for continued relevance to meet evolving needs and challenges.

Signup and view all the flashcards

Security Planning: Six Issues

Security plans must address six key issues.

Signup and view all the flashcards

Policy Realism

Ensure stated security requirements can be realistically implemented.

Signup and view all the flashcards

Complete Backup

Perform periodic backups of entire system, ensuring all data is securely stored.

Signup and view all the flashcards

System Admin Responsibility

Each system administrator is responsible for developing an incident handling plan.

Signup and view all the flashcards

Study Notes

Chapter Outline

  • This chapter addresses why administering security is important
  • The chapter also covers elements to know as an information security officer

Contributors to Security Problems

  • Low awareness of security problems, like underestimating the complexity
  • No unique responsibility when users share resources
  • No audit trails to track user activities and system events
  • Environmental attacks targeting physical infrastructure
  • No backups of critical data increases risk of data loss
  • Amateur quality software introduces vulnerabilities
  • High portability of devices expands attack surface
  • Combination of duties increases insider threats

Security Measures

  • Three classes of security measures exist, including procedures for use, hardware controls, and software controls

Issues Addressed by Procedures for Use

  • Implementing policies for user authentication, access control, data handling, and incident response
  • Instructing users not to leave PCs unattended in exposed environments
  • Advising users not to leave printers unattended when printing sensitive output
  • Securing media containing sensitive information
  • Performing regular backups of critical data and system configurations
  • Implementing separation of authority

Issues Addressed by Hardware Control

  • Securing equipment housing sensitive hardware components to prevent physical access
  • Using add-on security boards or modules for protection like hardware-based encryption
  • Examples include biometric authentication, smart cards, locks, and surveillance cameras
  • Controls safeguard assets, infrastructure, and resources from physical threats

Issues Addressed by Software Control

  • Deploying software controls within applications, OS, and network devices
  • Using software with full understanding of threats, awareness of vulnerabilities ,and safe usage guidelines
  • Avoiding software from dubious resources
  • Being cautious of results from software applications
  • Maintaining periodic backups of all system resources

Network Security Management

  • Securing a Wide Area Network (WAN)
  • Distance and Size: Managing infrastructure due to vast geographical spread
  • Distance and Size: Distance impacting performance and security
  • Distance and Size: Requires planning and coordination to protect entire infrastructure
  • Insiders and Outsiders: Distinguishing between legitimate and unauthorized users due to diversity
  • Insiders pose potential risks intentionally or unintentionally
  • Outsiders include hackers, cybercriminals who probe for vulnerabilities
  • Ownership and Responsibility: WANs involve multiple stakeholders with different roles
  • The distributed nature of ownership can cause challenges in consistent policy enforcement
  • Establishing clear lines of ownership and communication is essential

Elements to consider when administering network security

  • Architecture (structure, connectivity, permissions, backups)
  • Host (software versions, accounts)

Network Security Management - Incidents

  • Each system administrator should develop an incident handling plan
  • Users should know what is suspicious behavior and who to report it to
  • The administrator should have a management contact list in emergencies.
  • Management should have decided on action for an attack like close operations
  • Have means to notify users

Network Security Management - Tools:

  • CRACK is a collection of password checking tools
  • Tripwire is a tool to use after a suspected penetration
  • COPS is a set of programs that check important system files, user configurations
  • SATAN is a collection of network analysis tools

Network Security Management - CRACK

  • CRACK is designed to assess strength and security of user passwords
  • Administrators run the tool against a password file or database
  • It employs dictionary-based, brute-force, and rule-based attacks
  • Analyzing results from crack will let admins identify users with weak passwords

Network Security Management - Tripwire

  • Tripwire is an Intrusion Detection System IDS, that monitors and alerts administrators to changes in critical system files, directories, and configurations
  • After a suspected penetration or security breach, administrators can conduct a post-incident analysis
  • Comparing current system states with baseline configurations stored in a secure database detects unauthorized modifications, file tampering.
  • Administrators can use Tripwire's reporting and alerting features to investigate activities, identify security incidents, and take appropriate actions.

Network Security Management - COPS

  • COPS (Computer Oracle and Password System) is a set of programs designed to assess and evaluate the security posture of UNIX-based systems.
  • COPS checks important system files, user configurations, permissions settings, and other critical parameters to identify potential security flaws or weaknesses that could contribute to undesirable events.
  • To use COPS, administrators typically run the tool on target systems to perform security audits and vulnerability assessments.
  • COPS generates detailed reports listing security issues, misconfigurations, and vulnerabilities discovered during the assessment, allowing administrators to prioritize remediation efforts and strengthen the overall security of the system.

Network Security Management - SATAN

  • SATAN (Security Analysis Tool for Auditing Networks) is a collection of network analyses tools designed to audit and assess the security of networked systems and services
  • To use SATAN, administrators deploy the tool to scan networked host, servers, and services for potential security vulnerabilities, misconfigurations, and weaknesses.
  • SATAN performs various security test and checks against target systems including port scanning, service enumeration, version detection, and vulnerability identification.
  • Administrators can analyze the results generated by SATAN to identify security gaps, prioritize remediation efforts, and implement appropriate security measures to protect against potential threats and attacks.

Computer Emergency Response Team

  • CERT was formed because the Internet worm incident exposed no central source of information for security incidents involving Internet hosts.
  • The U.S. Department of Defense established CERT at the Software Engineering Institute at Carnegie Mellon University.
  • CERT monitors reports of incidents and security flaws, helps manufacturers, develops fixes to security problems and issues notices of problems and solutions

Risk Analysis

  • Security planning begins with risk analysis.
  • Risk analysis determines the exposures and their potential harm.
  • Reasons to perform risk analysis: improve awareness, identify assets and vulnerabilities, improve basis for risk decisions, and justify security expenditure

Risk Analysis - Steps

  • Identify assets
  • Determine vulnerabilities
  • Estimate likelihood of exploitation
  • Compute expected annual loss
  • Survey applicable controls and their costs
  • Project annual savings of control.

Security Planning

  • A security plan describes how an organization will address its needs.
  • The plan is subject to revision as changes in requirements happen

Six Issues Security Plans must Address

  • Policy
  • Current state
  • Recommendations and requirements
  • Accountability
  • Timetable
  • Continuing attention

Security planning - Policy

  • A policy defines the overarching security policies and principles which guide an organization's method to security
  • This includes rules, standards, and guidelines for protecting assets as well as managing risks and compliance
  • The policy statement addresses who should be allowed access, what resources, and how should access be regulated

Security Planning - Current Security Status

  • Risk analysis can form the basis of a description of the current security status.
  • The assessment will include existing security measures, controls and practices (listing the assets of the organization, security threats to the assets and the controls in place to protect the assets).

Security Planning - Recommendations and Requirements

  • The heart of the security plan is action that will be taken.
  • Create recommendations for enhancing security and specify requirements for implementing new security measures, controls, and protocols to address identified risks and vulnerabilities.
  • Include requirements are being imposed and over what period they are being instituted.
  • Plans must be extensible over time

Security Planning - Responsibility for Implementation

  • Define roles, responsibilities, and accountability mechanisms for personnel involved in security management and enforcement
  • Assign responsibilities for implementing security measures, monitoring compliance, and responding to security incidents
  • All individuals will understand what can be done and who to coordinate with.

Security Planning - Timetable

  • Develop a timetable for implementing the recommended security measures, set deadlines and milestones
  • If the controls are expensive or complicated, they may be acquired and implemented

Security Planning - Continuing Attention

  • Establishing an evaluation and review date of the security situation that includes regular reviews, updates, and revisions to the security plan to adapt to evolving threats, changes in the organization's environment, and emerging security challenges
  • The security plan should arrange periodic reviews.

Contingency Planning - Backup

  • Includes copying all or part of a file for recovering data loss
  • It requires performing periodic backups of the entire system in storage.
  • Maintain a rotating set of backups, retaining recent backups
  • Save only the files have been modified or created since the last backup

Off- site Backup

  • Requires taking completed backups and physically transporting it to designated locations
  • Reduces data loss if primary systems are damaged

Networked Storage - Contingency planning

  • Services offer storage space data remotely.
  • Ideal for backing up critical data, as you can select a storage provider whose physical location is separate from your processing facility.
  • Ensures data integrity and availability if backups are separated.

Cold Site - Contingency planning

  • Facility with power and cooling infrastructure to install systems for operations
  • Some use their facilities while others lease from disaster recovery providers
  • Organizations restore operations at a cold site within a week

Hot Site - Contingency Planning

  • Facilities are equipped with a fully operational computing system, telecommunications lines, power supplies, trained personnel.
  • Utilized for mission-critical applications needing minimal downtime
  • Can be owned by leased from the organization or disaster recovery providers
  • Activation of a hot site requires loading software and data from offsite backup sources

Good Security Policy - Coverage

  • The security policy must be comprehensive
  • It should also be sufficiently broad to accommodate new situations as they may arise

Good Security Policy - Durability

  • Durability is necessary to adapt policies over time.
  • Policies must be flexible to changes over time.
  • However, it should be amendable overtime to effectively address new conditions

Good Security Policy - Realism

  • The policy must be realistic, stated security requirements have to be feasible to implement with current tech
  • The implementation should practically benefit users in terms of saving time ,cost-effectiveness, and convenience.

Good Security Policy - Usefulness

  • The usefulness of a security policy hinges on its clarity and comprehensibility.
  • Policies are obscure if it is discarded if incorrectly
  • Written in a way that can be understood and followed that must be concise and direct.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

More Like This

Use Quizgecko on...
Browser
Browser