Network Security: Standard System Attacks

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which of the following best describes a computer virus?

  • A tool used to intercept and steal sensitive information
  • A self-replicating program that spreads across a network
  • A program that hides inside a harmless-looking file
  • A small program that alters how a computer operates and causes damage (correct)

Which type of virus replicates itself and spreads to other machines, often via email?

  • Trojan horse
  • Polymorphic virus
  • Worm (correct)
  • Boot sector virus

What is the primary characteristic of a polymorphic virus?

  • It changes its encryption key to avoid detection. (correct)
  • It hides inside macro files.
  • It attaches itself to executable files.
  • It resides in the boot sector of a hard drive.

What is the primary goal of a Denial of Service (DoS) attack?

<p>To disable a particular server (B)</p> Signup and view all the answers

Which attack involves exploiting IP broadcast addressing operations to amplify the impact on a target network?

<p>Smurfing (C)</p> Signup and view all the answers

What is the main purpose of 'spoofing' in the context of network security?

<p>To create a packet that appears to be from someone else (D)</p> Signup and view all the answers

Which type of attack involves redirecting a user to a fake website that mimics a legitimate one?

<p>Pharming (A)</p> Signup and view all the answers

What is the primary function of a keylogger?

<p>To record a user's keystrokes (D)</p> Signup and view all the answers

Why is physical security important for network security?

<p>All of the above (D)</p> Signup and view all the answers

What is the purpose of a 'honeypot' in network security?

<p>To serve as a decoy to attract and monitor attackers (A)</p> Signup and view all the answers

Which access control measure restricts access based on the time of day?

<p>Limiting time of day access (B)</p> Signup and view all the answers

When referring to access rights, what does 'execute' typically allow a user to do?

<p>Run a program or script (B)</p> Signup and view all the answers

What is a key principle for creating strong passwords?

<p>Change password often and using a combination of characters (A)</p> Signup and view all the answers

Which of the following is an example of biometrics used for authentication?

<p>Fingerprint scan (C)</p> Signup and view all the answers

What is the primary purpose of auditing in network security?

<p>To detect wrongdoing (B)</p> Signup and view all the answers

In cryptography, what is 'plaintext'?

<p>Unencrypted data (C)</p> Signup and view all the answers

What is the purpose of a 'key' in encryption?

<p>To decrypt the ciphertext back into plaintext (B)</p> Signup and view all the answers

In a monoalphabetic substitution cipher, how are characters replaced?

<p>Characters are replaced systematically based on a key. (B)</p> Signup and view all the answers

How does a polyalphabetic substitution cipher differ from a monoalphabetic cipher?

<p>It uses multiple alphabetic strings or keys to encode the plaintext. (B)</p> Signup and view all the answers

In a transposition-based cipher, what is altered to encrypt the message?

<p>The order of the characters (A)</p> Signup and view all the answers

In public key cryptography, what is the purpose of the public key?

<p>To encrypt messages (A)</p> Signup and view all the answers

What characteristic is essential for public key cryptography?

<p>One key cannot be deduced from the other. (C)</p> Signup and view all the answers

How do digital signatures provide authentication?

<p>By using a hash encoded with the owner's private key (A)</p> Signup and view all the answers

What action occurs when a digitally signed document is opened?

<p>The document's authenticity and integrity are verified (C)</p> Signup and view all the answers

Which of the following is a primary function of a firewall?

<p>To support an access control policy between two networks (B)</p> Signup and view all the answers

How can firewalls be used to restrict specific applications?

<p>By filtering based on TCP port numbers (A)</p> Signup and view all the answers

What is a packet filter firewall primarily based on?

<p>Examining IP addresses and TCP port numbers (A)</p> Signup and view all the answers

What is the main advantage of a proxy server firewall?

<p>It provides enhanced security by acting as an intermediary. (B)</p> Signup and view all the answers

What additional functionality does an application layer firewall offer compared to packet filtering?

<p>Inspection of packet content based on application (D)</p> Signup and view all the answers

What makes WLANs inherently more vulnerable to intrusion compared to wired networks?

<p>The wireless medium is not contained. (A)</p> Signup and view all the answers

Why is hardware theft a significant security risk for WLANs?

<p>The hardware may store sensitive network information. (D)</p> Signup and view all the answers

What security risk does rogue AP pose?

<p>They can impersonate a valid device. (A)</p> Signup and view all the answers

Which action is an example of 'passive monitoring' in WLAN security?

<p>Capturing and analyzing data transmissions (A)</p> Signup and view all the answers

What is the main goal of a Denial of Service (DoS) attack on a WLAN?

<p>To prevent legitimate users from accessing the network (B)</p> Signup and view all the answers

What does the process of 'authentication' verify in WLAN security?

<p>That user has permission to access the network (A)</p> Signup and view all the answers

How can turning off SSID broadcast enhance WLAN security?

<p>By hiding the network from unintentional discovery (C)</p> Signup and view all the answers

What is the primary goal of privacy measures in WLAN security?

<p>To encrypt network traffic (A)</p> Signup and view all the answers

What is considered a major weakness of WEP (Wired Equivalent Privacy)?

<p>It's encryption key is too short. (B)</p> Signup and view all the answers

Why was WPA (Wi-Fi Protected Access) developed?

<p>To address the vulnerabilities in WEP (C)</p> Signup and view all the answers

Which feature does TKIP (Temporal Key Integrity Protocol) add to wireless security?

<p>Per-packet key-mixing (C)</p> Signup and view all the answers

What is a key feature of WPA2 that distinguishes it from WPA?

<p>Compatibility with the IEEE 802.11i standard (D)</p> Signup and view all the answers

What is the purpose of Push-Button Wireless Security?

<p>To automatically configure security settings (B)</p> Signup and view all the answers

Besides encryption, what other strategies can improve additional WLAN security?

<p>Reducing WLAN transmission power (A)</p> Signup and view all the answers

Flashcards

Computer Virus

Malicious program that alters computer operation, often damaging data and system components.

Computer Worm

A program that copies itself across a network without human help, often via email.

Trojan Horse

Hiding malicious code within harmless-looking files, like in an email.

Socially Engineered Attack

An attack using social skills to trick users into revealing sensitive information.

Signup and view all the flashcards

Exploiting Known Vulnerabilities

Exploiting weaknesses in software to compromise a system.

Signup and view all the flashcards

Denial of Service (DoS) Attack

Sending excessive messages to overwhelm and disable a server.

Signup and view all the flashcards

Ping Storm

Using the Internet ping program to flood a server with packets.

Signup and view all the flashcards

E-mail Bombing

Sending someone a large volume of unwanted emails, overwhelming their inbox.

Signup and view all the flashcards

Smurfing

Attacking a network using IP broadcast addressing operations to amplify the attack.

Signup and view all the flashcards

IP Spoofing

Creating a network packet that appears to originate from a fake IP address.

Signup and view all the flashcards

Spoofing (General)

Creating a packet that appears to be something or someone else to gain trust.

Signup and view all the flashcards

Phishing

Creating emails that look legitimate but are designed to steal personal information.

Signup and view all the flashcards

Pharming

Redirecting users to a fake website that imitates a legitimate one.

Signup and view all the flashcards

Botnets

Malicious programs controlling operations on a compromised computer.

Signup and view all the flashcards

Rootkit

A program installed deep within a system to remotely take control and avoid detection.

Signup and view all the flashcards

Keylogger

Software that secretly captures and records keystrokes from a user's keyboard.

Signup and view all the flashcards

Environmental Protection

Protecting systems from environmental threats such as floods and earthquakes.

Signup and view all the flashcards

Physical Security

Securing facilities by locking rooms and devices to prevent unauthorized physical access.

Signup and view all the flashcards

Surveillance

Using cameras to deter theft and document activities for security purposes.

Signup and view all the flashcards

Honeypot

An indirect surveillance method using traps to detect and observe malicious activity.

Signup and view all the flashcards

Access Control

Restricting who can access specific resources to protect sensitive data.

Signup and view all the flashcards

Access Rights

Rights granted to users determining what actions they can perform on a resource.

Signup and view all the flashcards

Authentication

The process of verifying a user's identity to grant access to a system or network.

Signup and view all the flashcards

Password Rotation

Regularly changing passwords to prevent unauthorized access and protect accounts.

Signup and view all the flashcards

Biometrics

Using fingerprints, face scans, or voice prints for identification.

Signup and view all the flashcards

Multifactor Authentication

Combining multiple identification methods for increased security.

Signup and view all the flashcards

Auditing

A record that lists who accessed what resources and when, to detect wrongdoing.

Signup and view all the flashcards

Cryptography

The study of encryption and decryption techniques to secure communications.

Signup and view all the flashcards

Plaintext

Unencrypted data, readable by anyone.

Signup and view all the flashcards

Ciphertext

Encrypted data, unreadable without the decryption key.

Signup and view all the flashcards

Encryption Key

Unique information used to encrypt and decrypt data.

Signup and view all the flashcards

Monoalphabetic Substitution

Replacing characters with different characters based on a key.

Signup and view all the flashcards

Polyalphabetic Substitution

Using multiple alphabetic strings to make encrypted message more secure.

Signup and view all the flashcards

Transposition Cipher

Encrypting data by altering the order of characters in the plaintext.

Signup and view all the flashcards

Public Key Cryptography

An system that uses two keys, one public for encryption and one private for decryption.

Signup and view all the flashcards

Digital Signature

Attaching a unique, encrypted identifier to a document to verify authenticity.

Signup and view all the flashcards

Firewall

A system that controls network access between two networks based on security rules.

Signup and view all the flashcards

Packet Filter Firewall

A firewall that filters traffic based on IP addresses and TCP port numbers.

Signup and view all the flashcards

Proxy Server Firewall

A firewall that acts as an intermediary, forwarding requests between networks.

Signup and view all the flashcards

Application Layer Firewall

A firewall that inspects the content of packets at the application layer.

Signup and view all the flashcards

Hardware Theft (WLAN Security)

Attackers stealing wireless hardware to gain network access.

Signup and view all the flashcards

Study Notes

  • Week 9 focuses on Network Security.

Introduction

  • Computer systems are increasingly vulnerable despite having better security systems.
  • Vulnerability comes from worldwide Internet access to computer systems.
  • Encryption algorithms, access controls, digital signatures, and biometrics are forms of computer and network security.

Standard System Attacks

  • Viruses are small computer programs that alter computer operation, deleting and corrupting data, program files or operating system files
  • Parasitic viruses attach to files
  • Macro viruses reside in macro files attached to applications and install when executed.
  • Stealth viruses attach to the operating system.
  • Boot sector viruses reside in removable media; these can infect a computer when it is started.
  • Polymorphic viruses mutate, changing their encryption keys, making them difficult to detect.
  • Computer worms copy themselves from one system to another over a network without human intervention.
  • Worms often propagate through email.
  • Viruses and worms are typically transported as Trojan horses, disguised inside harmless code.
  • Social engineering and exploiting known vulnerabilities in operating systems or application software are two popular forms of attacks.
  • Software companies issue patches for vulnerabilities; these can either fix the vulnerability or create more holes which can then be exploited.
  • Common attack vectors include email attachments and scanning computer ports connected to the Internet.
  • Denial-of-service (DoS) attacks disable a server by overwhelming it with requests.
  • A ping storm is a condition in which the Internet ping program sends a flood of packets to a server.
  • E-mail bombing is when one sends an excessive amount of unwanted e-mail.
  • Smurfing is a technique using IP broadcast addressing operations to attack a network.
  • Smurfing relates to spoofing and is often used in denial of service attacks.
  • A user creates a packet that appears to be something else or from someone else when spoofing
  • Phishing involves hackers creating emails that look as if they are coming from a legit source but are trying to get the user to give up ID and password info.
  • Pharming redirects unknowing users to bogus look-alike websites.
  • Stealing, guessing, and intercepting passwords is a tried and true form of attack.
  • Botnets are malicious programs that take over operations on a compromised computer.
  • Rootkits are programs that have been installed deep within a user's operating system and defy detection.
  • Keyloggers secretly capture and record keystrokes made at a user's keyboard.

Physical Protection

  • Physical protection is needed from environmental damage and from physical security breaches.
  • Electrical protection and noise protection are needed.

Physical Protection (continued)

  • Surveillance and proper placement of security cameras can deter theft and vandalism as well as provide a record of activities.
  • Intrusion detection is a field of study in which specialists try to prevent intrusion and try to determine if a computer system has been violated by dataflow monitoring
  • Honeypots are an indirect form of surveillance where network personnel create a trap, watching for unscrupulous activity

Controlling Access / Access Rights

  • Controlling access involves deciding who has access to what, limiting time of day access, Limiting day of week access and Limiting access from a location
  • Access rights include being able to Read, write, delete, print, copy, and execute Most network operating systems have a powerful system for assigning access rights

Passwords and ID Systems

  • Passwords are the most common form of security and the most abused.
  • Simple rules help support safe passwords, including changing password often, picking a good random password of at least 8 characters, not sharing passwords or writing them down and Don't select names and familiar objects as passwords
  • Many new forms of "passwords" are emerging, including fingerprints, face prints, retina scans and iris scans, voice prints, ear prints and combinations of forms of identification called multifactor identification

Auditing

  • Creating a computer or paper audit can help detect wrongdoing and also be used as a deterrent
  • Many network operating systems allow the administrator to audit most types of transactions
  • Criminals have been caught because of computer-based audits

Basic Encryption and Decryption Techniques

  • Cryptography creates and uses encryption and decryption techniques.
  • Plaintext is the clear, unencrypted data before any encryption is performed.
  • Ciphertext is the encrypted data after encryption has been performed.
  • Keys are unique pieces of information used to create ciphertext and decrypt it back into plaintext.

Monoalphabetic Substitution- Based Ciphers

  • Monoalphabetic substitution-based ciphers replace a character or characters with a different character or characters, based upon some key
  • Example replacement from abcdefghijklmnopqrstuvwxyz to POIUYTREWQLKJHGFDSAMNBVCXZ so that "how about lunch at noon" becomes "EGVPO GNMKN HIEPM HGGH"
  • If someone intercepts a simple key, they can decrypt the whole conversation

Polyalphabetic Substitution- Based Ciphers

  • Polyalphabetic ciphers are similar to monoalphabetic ciphers except multiple alphabetic strings are used to encode the plaintext
  • A matrix of strings uses 26 rows by 26 characters or columns.
  • A key such as COMPUTERSCIENCE is placed repeatedly over the plaintext COMPUTERSCIENCECOMPUTERSCIENCECOMPUTER thisclassondatacommunicationsisthebest
  • To encode the message, take the first letter of the plaintext, t, and the corresponding key character immediately above it, C. Look in the 26x26 matrix where the row C intersects column t where the ciphertext character V is present and then continue with the other characters in plaintext

Transposition-Based Ciphers

  • Transposition-based ciphers do not preserve the order of the plaintext.
  • For a the key COMPUTER, number the letters in alphabetical order: 14358726
  • The read the ciphertext down the columns, starting with the column numbered 1, followed by column number 2

Public Key Cryptography

  • Public key cryptography is a robust encryption technique using two keys.
  • Public Key encrypts the message and another private key decrypts.
  • It is not possible to deduce one key from the other
  • Secure Sockets Layer on the Internet is an example

Digital Signatures

  • Used to authenticate the owner of the document
  • Document to be signed goes through a complex mathematical computation that generates a hash
  • The hash is encoded with the owner's private key, and then stored
  • In future, hash is decoded using the owner's public key and both are compared to prove the document belongs to the owner
  • Some countries accepts digitally signed documents as legal proof.

Firewalls

  • A system that supports an access control policy between two networks.
  • Limit the types of transactions that can enter or leave a system.
  • Can be programmed to control IP addresses and TCP port numbers.

Three Basic Types of Firewalls

  • Packet filter firewall – essentially a router that has been programmed to filter out or allow certain IP addresses or TCP port numbers, and can scan viruses or detect spoofing
  • Proxy server – more advanced firewall that acts as a doorman into a corporate network with Any external transaction requesting something from the corporate network must enter through the proxy server but makes accesses slower
  • Application layer – inspects all packets coming into or leaving a connection using the application layer of the TCP/IP protocol suite and the the most advanced fire wall, operating at packet filtering

Wireless LAN Security

  • Broadcasting network traffic over the airwaves has created new security issues for data transmissions with WLANs are far more exposed to intrusion because the medium is not contained.
  • Attacks include hardware theft, AP impersonation, passive monitoring and Denial of service (DoS)

802.11 Security

  • Authentication is when the Process verifies that the client device has permission to access the network is verified, and each WLAN client can be given the SSID of the network manually or automatically plus Turning off SSID broadcast can also protect your network against someone finding it unintentionally
  • Privacy ensures that transmissions are not read by unauthorized users using data encryption

802.11 Security (cont.)

  • Wired Equivalent Privacy (WEP) is a Data encryption specification for wireless devices with two versions: 64-bit and 128-bit encryption although the 128 is easy to decrypt and seldom used today
  • Wi-Fi Protected Access: Standard for network authentication and encryption, uses a 128-bit pre-shared key (PSK) and PSK uses a different encryption key for each client device, for each packet, and for each session
  • Wi-Fi Protected Access 2: version of WPA that has been certified by the IEEE to be compatible with IEEE 802.11i
  • Define a robust security network association (RSNA) and Provide Mutual authentication between client devices and AP • Controlled access to the network, Establishment of security keys and Key management

Additional WLAN Security Strategies

  • Reduce WLAN transmission power.
  • Change the default security settings on the APs.
  • Employ antivirus and antispyware software.
  • Separate WLAN transmissions from wired network traffic.
  • Put a firewall between the WLAN and the wired LAN.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

More Like This

MD07 - 04.- Seguridad en Internet (II)
63 questions
Computer Worms and Trojans Quiz
30 questions

Computer Worms and Trojans Quiz

FragrantBarbizonSchool avatar
FragrantBarbizonSchool
Understanding Viruses, Trojans, and Worms
10 questions
Use Quizgecko on...
Browser
Browser