Podcast
Questions and Answers
What is the main purpose of network security?
What is the main purpose of network security?
What type of attacks involve changing or modifying the content of messages?
What type of attacks involve changing or modifying the content of messages?
Which aspect of security does a passive attack pose a danger to?
Which aspect of security does a passive attack pose a danger to?
What is the primary concern in an active attack?
What is the primary concern in an active attack?
Signup and view all the answers
Why are security breaches considered expensive?
Why are security breaches considered expensive?
Signup and view all the answers
In which type of attack is the victim typically not informed about the attack?
In which type of attack is the victim typically not informed about the attack?
Signup and view all the answers
What does authenticity refer to in the field of information security?
What does authenticity refer to in the field of information security?
Signup and view all the answers
Which stage of an attack involves an attacker trying to gain root or administrator access?
Which stage of an attack involves an attacker trying to gain root or administrator access?
Signup and view all the answers
Why is it important to verify all parties in a transaction?
Why is it important to verify all parties in a transaction?
Signup and view all the answers
What is the purpose of network probing in the stages of an attack?
What is the purpose of network probing in the stages of an attack?
Signup and view all the answers
Which action reduces instances of fraud by misrepresentation?
Which action reduces instances of fraud by misrepresentation?
Signup and view all the answers
What is the primary aim of an attacker in capturing the network during an attack?
What is the primary aim of an attacker in capturing the network during an attack?
Signup and view all the answers
How can attackers make it difficult for Security Administrators to determine the source of an attack?
How can attackers make it difficult for Security Administrators to determine the source of an attack?
Signup and view all the answers
Which technique can be employed to evade detection by an Intrusion Detection System (IDS) that relies on 'pattern matching'?
Which technique can be employed to evade detection by an Intrusion Detection System (IDS) that relies on 'pattern matching'?
Signup and view all the answers
In terms of security control implementation, which category includes policy and procedural controls?
In terms of security control implementation, which category includes policy and procedural controls?
Signup and view all the answers
What type of controls are described as electronic, hardware, and software controls?
What type of controls are described as electronic, hardware, and software controls?
Signup and view all the answers
If attackers change the data in their attacks to avoid detection, what method are they utilizing?
If attackers change the data in their attacks to avoid detection, what method are they utilizing?
Signup and view all the answers
Which type of control involves mechanical aspects in security implementation?
Which type of control involves mechanical aspects in security implementation?
Signup and view all the answers
What is the primary reason for the increasing popularity of networks that use internet links?
What is the primary reason for the increasing popularity of networks that use internet links?
Signup and view all the answers
Which of the following best describes the term 'Interception' in the context of information security?
Which of the following best describes the term 'Interception' in the context of information security?
Signup and view all the answers
What is the main focus of the CIA Triad in information security?
What is the main focus of the CIA Triad in information security?
Signup and view all the answers
What does the term 'Integrity' mean in the context of the CIA Triad?
What does the term 'Integrity' mean in the context of the CIA Triad?
Signup and view all the answers
What type of attack involves the creation of wrong or counterfeit data?
What type of attack involves the creation of wrong or counterfeit data?
Signup and view all the answers
Which component of the CIA Triad ensures that data, objects, and resources are protected from unauthorized viewing and other access?
Which component of the CIA Triad ensures that data, objects, and resources are protected from unauthorized viewing and other access?
Signup and view all the answers
What is the primary function of an Intrusion Detection System (IDS)?
What is the primary function of an Intrusion Detection System (IDS)?
Signup and view all the answers
What is the main disadvantage of a Knowledge-Based IDS?
What is the main disadvantage of a Knowledge-Based IDS?
Signup and view all the answers
What advantage does a Behaviour-Based IDS have over a Knowledge-Based IDS?
What advantage does a Behaviour-Based IDS have over a Knowledge-Based IDS?
Signup and view all the answers
What is the primary function of a Network-based intrusion prevention system (NIPS)?
What is the primary function of a Network-based intrusion prevention system (NIPS)?
Signup and view all the answers
What is the main disadvantage of a Behaviour-Based IDS?
What is the main disadvantage of a Behaviour-Based IDS?
Signup and view all the answers
What is the primary function of a Wireless intrusion prevention system (WIPS)?
What is the primary function of a Wireless intrusion prevention system (WIPS)?
Signup and view all the answers
Study Notes
Network Security
- Network security involves policies and practices to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources.
Types of Attacks
- Active Attacks:
- Efforts to change or modify message content
- Danger to integrity and availability
- System is always damaged and resources can be changed
- Victim is informed about the attack
- Passive Attacks:
- Observing or copying message content
- Danger to confidentiality
- No harm to the system
- Victim is not informed about the attack
Importance of Effective Network Security Strategies
- Security breaches can be expensive in terms of business disruption and financial losses
- Importance of availability, authenticity, and confidentiality
Stages of an Attack
- Initial Information Gathering:
- Gathering information about a company's website, machines, IP addresses, and ranges
- Network Probe:
- Pinging systems to see which are alive
- Port scanning to identify unused ports
- Gaining Unauthorized Access:
- Guessing passwords to gain root or administrator access
- Capturing the Network:
- Installing hacking tools in the system
- Grabbing/Destroying data:
- Stealing confidential information and destroying files
Address Spoofing/Proxying
- Using poorly secured or incorrectly configured proxy servers to bounce an attack
- Making it difficult for Security Administrators to determine the source of the attack
Pattern Change Evasion
- Modifying attack data to evade detection by IDS
- IDS relies on pattern matching to detect attacks
Categories that Control the Implementation of Security Control
- Administrative: Policy and procedural controls
- Technical: Electronic, hardware, and software controls
- Physical: Mechanical controls
Important Terminology
- Interruption: Denying service to legitimate users (attack on availability)
- Interception: Unauthorized access to a service (attack on confidentiality)
- Modification: Unauthorized access and tampering of data (attack on integrity)
- Fabrication: Creation of wrong or counterfeit data (attack on authenticity)
The CIA Triad
- Confidentiality: Protecting data from unauthorized viewing and access
- Integrity: Protecting data from unauthorized changes to ensure reliability and correctness
- Availability: Ensuring authorized users have access to systems and resources
Intrusion Detection Systems (IDS)
- Hardware/software that monitors and analyses network activities for unauthorized intrusions
- Reports alerts in real-time for network administrators to take corrective action
IDS Types
- Knowledge-Based IDS:
- Uses previous knowledge about attacks (signatures stored in databases) to detect and report current attempts of intrusion
- Advantage: low false alarm rates
- Disadvantage: requires more resources for database storage
- Behaviour-Based IDS:
- Monitors user behavior to detect any anomaly (unusual behavior) to identify intrusion
- Advantage: can detect new kinds of vulnerabilities
- Disadvantage: high false alarm rate
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Description
Test your knowledge on the fundamentals of network security including policies, practices, preventive measures, and types of attacks. Learn about protecting computer networks from unauthorized access and threats.