Network Security: Chapter 9

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson
Download our mobile app to listen on the go
Get App

Questions and Answers

What is the primary function of a network?

  • To isolate devices from each other.
  • To prevent any unauthorized access to devices.
  • To limit the amount of data transferred between devices.
  • To connect two or more devices for communication. (correct)

Which of the following terms describes a vulnerability where data can be secretly listened to?

  • Wiretapping (correct)
  • Modification
  • Addressing
  • Fabrication

What is a common vulnerability associated with wireless networks?

  • Interception (correct)
  • Cable splicing
  • Inductance
  • Physical cable cuts

What does 'MAC' stand for in the context of network transmission media?

<p>Media Access Control (D)</p> Signup and view all the answers

Which type of network transmission is NOT susceptible to inductive tapping?

<p>Optical fiber (D)</p> Signup and view all the answers

What is the term for examining each packet as it goes by on a network?

<p>Packet sniffing (C)</p> Signup and view all the answers

What type of attack attempts to make a service unavailable to legitimate users?

<p>Denial of Service (A)</p> Signup and view all the answers

What is a 'frame' in the context of Wi-Fi networks?

<p>A unit of Wi-Fi data (B)</p> Signup and view all the answers

What is the purpose of link encryption?

<p>To encrypt data just before it is sent over the communication link. (D)</p> Signup and view all the answers

Which authentication mechanism is designed for client-server applications and uses a Key Distribution Center (KDC)?

<p>Kerberos (D)</p> Signup and view all the answers

A network requires more than two devices connected by hardware and software.

<p>False (B)</p> Signup and view all the answers

Data communications are only vulnerable when transmitted wirelessly.

<p>False (B)</p> Signup and view all the answers

Cable splicing involves an attacker cutting and splicing a secondary cable to receive a copy of data.

<p>True (A)</p> Signup and view all the answers

Optical fibers are easily tapped without detection.

<p>False (B)</p> Signup and view all the answers

A MAC address is a unique physical address assigned to a router.

<p>False (B)</p> Signup and view all the answers

Analyzing a file can only involve one host before reaching its destination.

<p>False (B)</p> Signup and view all the answers

A replay attack involves legitimate data being intercepted and replayed.

<p>True (A)</p> Signup and view all the answers

A 'SYN' flood is where the attacker overwhelms victims by filling their SYN_SEND queue.

<p>False (B)</p> Signup and view all the answers

In the context of networks, 'inductance' refers to the process of reading signals an intruder can read through wire radiation.

<p>True (A)</p> Signup and view all the answers

Kerberos requires a continuous availability of a non-trusted ticket granting server.

<p>False (B)</p> Signup and view all the answers

Which of the following represents a significant security risk associated with wireless communication compared to wired networks?

<p>Increased susceptibility to signal interception. (D)</p> Signup and view all the answers

In the context of network security, which of the following describes a 'sequencing attack'?

<p>Data packets arrive in an unintended order, disrupting communication. (A)</p> Signup and view all the answers

What is the primary purpose of a 'SYN flood' attack in the context of network security?

<p>To overwhelm a server by exhausting its resources for managing connection requests. (D)</p> Signup and view all the answers

Which of the listed options describes the purpose of 'traffic redirection' as a network attack?

<p>To mislead routers and disrupt normal network communication. (B)</p> Signup and view all the answers

Why is 'anonymity' a significant security concern in network environments?

<p>It makes it difficult to trace the origin of network traffic. (B)</p> Signup and view all the answers

Which statement explains why 'Inductance' can be a security vulnerability in network transmission media?

<p>It permits intruders to read signals through wire radiation without physical contact. (C)</p> Signup and view all the answers

Which of the following is a key characteristic of a 'Smurf attack'?

<p>It involves sending a flood of ping packets with a spoofed source address. (D)</p> Signup and view all the answers

What is a primary security advantage of using optical fiber for network communication?

<p>It is not subject to inductive tapping. (C)</p> Signup and view all the answers

What is the main purpose of link encryption in network security?

<p>To encrypt data only between adjacent nodes on a network. (B)</p> Signup and view all the answers

What is a significant limitation of Kerberos in distributed systems?

<p>It requires continuous availability of a trusted ticket granting server. (D)</p> Signup and view all the answers

In a network, inductance is a process where an intruder must make physical contact with the cable to tap a wire.

<p>False (B)</p> Signup and view all the answers

An attacker employing a substitution attack inserts additional data values into a data stream, disrupting its integrity.

<p>False (B)</p> Signup and view all the answers

Optical fiber's immunity to wiretapping is primarily due to its use of light energy, which prevents emanations detectable through inductance.

<p>True (A)</p> Signup and view all the answers

A physical replay attack involves intercepting and reusing legitimate data packets without any modification.

<p>False (B)</p> Signup and view all the answers

In a SYN flood DoS attack, the attacker's true identity is easily traceable due to the nature of TCP connection establishment.

<p>False (B)</p> Signup and view all the answers

The SESAME protocol in distributed systems relies exclusively on symmetric-key cryptography for secure communications.

<p>False (B)</p> Signup and view all the answers

In wireless networks, the SSID hides a wireless access point.

<p>False (B)</p> Signup and view all the answers

In the context of network security, intercepting communications is only a minor threat compared to integrity and availability threats.

<p>False (B)</p> Signup and view all the answers

The primary advantage of link encryption over end-to-end encryption is that it permits users to selectively encrypt individual messages based on their sensitivity.

<p>False (B)</p> Signup and view all the answers

Kerberos is designed to withstand attacks in distributed environments, however, it operates effectively even without continual availability of a trusted ticket granting server (KDC).

<p>False (B)</p> Signup and view all the answers

Flashcards

Network

Two devices connected by hardware and software enabling communication.

Cable Vulnerability

Signals in Ethernet or LAN vulnerable to interception.

Packet Sniffing

Examining each data packet as it goes by, often using tools like Wireshark.

Radiation Threat

Signals radiate from wires, allowing intruders to read them.

Signup and view all the flashcards

Cable Splicing

Cutting and splicing a cable to receive a copy of the data.

Signup and view all the flashcards

Data Communications Vulnerability

Travel either on a wire or wirelessly, both are vulnerable.

Signup and view all the flashcards

Protocol

A language or set of conventions for how two computers communicate.

Signup and view all the flashcards

Substitution Attack

The replacement of one piece of a datastream with another.

Signup and view all the flashcards

Replay Attack

Legitimate data intercepted and reused, without modification.

Signup and view all the flashcards

Denial of Service (DoS)

Prevents authorized users from accessing services or data.

Signup and view all the flashcards

MAC Address

Each LAN connector has a unique identifier.

Signup and view all the flashcards

Radiation

Signals radiate from wires.

Signup and view all the flashcards

Port

Number associated with an application.

Signup and view all the flashcards

Sequencing attack

When packet 2 arrives before packet 1.

Signup and view all the flashcards

Insertion attack

Insert data values into a stream.

Signup and view all the flashcards

SYN flood

Overwhelm victims by filling their SYN_RECV queue.

Signup and view all the flashcards

DDoS Attack

Attacker infects multiple machines with Trojan horses.

Signup and view all the flashcards

Wiretapping

Means to intercept communications.

Signup and view all the flashcards

Data Interception

Data can be intercepted via eavesdropping on wired or wireless networks.

Signup and view all the flashcards

Microwave Communication :

Broadcast through the air, making them more accessible to outsiders

Signup and view all the flashcards

Satellite communication

On signal's return to earth, the wide broadcast's footprint, allows any antenna within range to obtain the signal without being detected.

Signup and view all the flashcards

Addressing on a network

Every computer connected to a network has a network interface card with a unique physical address.

Signup and view all the flashcards

Routing

Routers direct traffic on a path that leads to a destination.

Signup and view all the flashcards

SSID

An SSID is a string to identify a wireless access point

Signup and view all the flashcards

Flooding Attack

A flooding attack occurs from demand in excess of capacity, from malicious or natural causes.

Signup and view all the flashcards

IP Fragmentation: Teardrop

Attack sends overlapping fragments of the datagram that cannot be properly reassembled by the recipient.

Signup and view all the flashcards

Traffic Redirection

By misleading routers about the best paths to network addresses, attackers can disrupt network communication

Signup and view all the flashcards

Optical Fiber Security

Optical network must be tuned carefully each time a new connection is made. Therefore, no one can tap an optical system without detection.

Signup and view all the flashcards

Microwave Weakness

Exposed to interception along the path of transmission. Requires line of sight location.

Signup and view all the flashcards

Interruption Threat

A loss of service caused by attacks against routing.

Signup and view all the flashcards

Network Impersonation

Pretending to be someone or something else on a network.

Signup and view all the flashcards

Denial of Service

Result of action preventing a telecommunications system from working.

Signup and view all the flashcards

Link Encryption

Data is encrypted just before being placed on physical communication links.

Signup and view all the flashcards

End-to-End Encryption

Provides security from one end of a transmission to the other.

Signup and view all the flashcards

Kerberos

A trusted service that provides authenticated tokens (tickets) for client-server applications.

Signup and view all the flashcards

Message Confidentiality

Violations in the delivery, exposure, or traffic flow of messages.

Signup and view all the flashcards

Optical Fiber Weakness

Wiretappers can tap at the repeaters, splices and other equipment.

Signup and view all the flashcards

Message Integrity Violation

Changing message content, parts, or re-direction of the message.

Signup and view all the flashcards

Study Notes

  • Cable signals in Ethernet or other LAN are vulnerable to interception
  • Each LAN connector has a MAC address
    • Packet sniffing examines each packet as it goes by, using Wireshark for example
    • Wires radiate signals, and an intruder can read through inductance
    • Cable splicing involves an attacker cutting and splicing in a secondary cable to receive copy of data
  • Optical fiber cannot be tapped without being detected
    • Optical fiber is not subject to inductive tap
  • Microwave broadcasts through the air, making it more accessible to outsiders
  • Satellite Communication's wide broadcast footprint allows any antenna in range to obtain the signal without being detected
  • Other radio wave technologies comprise cellular, Bluetooth, and near-field communication

Authentication Issues in Distributed System

  • Kerberos is designed to withstand attacks, including no password transmitted on the network
    • Cryptographic protection against spoofing
    • Limited period of validity
    • Timestamps to prevent replay attacks
    • Mutual authentication
  • Kerberos is not perfect because it requires continuous availability of a trusted ticket granting server, or KDC - Servers authenticity needs a trusted relationship between the ticket granting server and every server - Kerberos requires timely transactions - A subverted workstation could save and replay passwords
  • Kerberos was designed at MIT
  • The basis of Kerberos is a central server that provides authenticated tokens called tickets to requesting application
  • Password guessing attacks can still be effective if weak passwords are used in Kerberos
  • Kerberos may not scale well in large or highly dynamic environments due to overhead of TGTs and KDCs
  • Kerberos provides authentication and encryption but might not address all security concerns like secure authorization or DoS

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

More Like This

Use Quizgecko on...
Browser
Browser