Podcast
Questions and Answers
Which protocol uses port 80?
Which protocol uses port 80?
- FTP
- HTTP (correct)
- HTTPS
- SMTP
A MAC address is a unique hardware identifier crucial for LAN communication.
A MAC address is a unique hardware identifier crucial for LAN communication.
True (A)
What is the purpose of ARP?
What is the purpose of ARP?
To translate IP addresses into MAC addresses.
____ is a process that checks a host's ports to see which are open.
____ is a process that checks a host's ports to see which are open.
What is a common risk associated with port scanning?
What is a common risk associated with port scanning?
Match the following components with their definitions:
Match the following components with their definitions:
War driving refers to a legitimate method of accessing a wireless network.
War driving refers to a legitimate method of accessing a wireless network.
What is a recommended measure to secure a router?
What is a recommended measure to secure a router?
Which type of denial of service attack sends excessive requests to overwhelm a server's ability to handle them?
Which type of denial of service attack sends excessive requests to overwhelm a server's ability to handle them?
A replay attack involves capturing communication and sending it again to gain unauthorized access.
A replay attack involves capturing communication and sending it again to gain unauthorized access.
What is the primary purpose of encryption in a VPN?
What is the primary purpose of encryption in a VPN?
What are the three main types of VPNs mentioned?
What are the three main types of VPNs mentioned?
An attacker can monitor and log network traffic using a ______.
An attacker can monitor and log network traffic using a ______.
Digital certificates are used to verify the identity of clients connecting to a server.
Digital certificates are used to verify the identity of clients connecting to a server.
What is the role of a Certificate Authority (CA)?
What is the role of a Certificate Authority (CA)?
Match the denial of service attack with its description.
Match the denial of service attack with its description.
What is a characteristic of a secure VPN?
What is a characteristic of a secure VPN?
The main process in TLS involves a __________ between the client and server.
The main process in TLS involves a __________ between the client and server.
In a hub-based network, packet sniffing is more difficult compared to a switch-based network.
In a hub-based network, packet sniffing is more difficult compared to a switch-based network.
Which of the following encryption standards is commonly used in VPNs?
Which of the following encryption standards is commonly used in VPNs?
What could be the result of an overloaded switch in a network?
What could be the result of an overloaded switch in a network?
Match the TLS version with its key properties:
Match the TLS version with its key properties:
TLS 1.3 includes support for weaker protocols from previous versions.
TLS 1.3 includes support for weaker protocols from previous versions.
What is the significance of Forward Secrecy in TLS 1.3?
What is the significance of Forward Secrecy in TLS 1.3?
Flashcards
Network Port
Network Port
A virtual address for communication on a network, associated with a specific protocol.
Port Scanning
Port Scanning
Checking network ports to identify open ones and services running on them.
HTTP
HTTP
Protocol used for transferring web pages and data on the internet.
MAC Address
MAC Address
Signup and view all the flashcards
IP Address
IP Address
Signup and view all the flashcards
Port Scanning Vulnerability
Port Scanning Vulnerability
Signup and view all the flashcards
War Driving
War Driving
Signup and view all the flashcards
Router Vulnerability
Router Vulnerability
Signup and view all the flashcards
Denial of Service (DoS)
Denial of Service (DoS)
Signup and view all the flashcards
Service Request Flood
Service Request Flood
Signup and view all the flashcards
Bandwidth Flood DoS
Bandwidth Flood DoS
Signup and view all the flashcards
SYN Flood
SYN Flood
Signup and view all the flashcards
Packet Sniffing
Packet Sniffing
Signup and view all the flashcards
ARP Spoofing
ARP Spoofing
Signup and view all the flashcards
DNS Spoofing
DNS Spoofing
Signup and view all the flashcards
Replay Attack
Replay Attack
Signup and view all the flashcards
Hybrid VPN
Hybrid VPN
Signup and view all the flashcards
Encryption (VPN)
Encryption (VPN)
Signup and view all the flashcards
Transport Mode Encryption
Transport Mode Encryption
Signup and view all the flashcards
Tunnel Mode Encryption
Tunnel Mode Encryption
Signup and view all the flashcards
Digital Certificate
Digital Certificate
Signup and view all the flashcards
TLS (Transport Layer Security)
TLS (Transport Layer Security)
Signup and view all the flashcards
TLS Handshake
TLS Handshake
Signup and view all the flashcards
Forward Secrecy
Forward Secrecy
Signup and view all the flashcards
Study Notes
Ports
- Ports are virtual start and end points for network communication.
- Each port has a unique number.
- Specific ports are assigned protocols to differentiate traffic types (e.g., HTTP uses port 80).
Key Hardware Components
- Network Interface Card (NIC): Converts data into electrical signals for communication.
- Media Access Control (MAC) Address: Unique hardware ID for devices crucial for LAN communication.
- Hubs and Switches: Connect devices in a network; switches route data only to intended devices using MAC addresses.
Key Internet Components
- HTTP (Hyper Text Transfer Protocol): Controls data communication over the internet (e.g., retrieving web pages).
- IP Address: Unique device identifier on the internet; can change.
- URL (Uniform Resource Locator): Readable way to access an IP address; translated by Domain Name Servers (DNS).
- ARP (Address Resolution Protocol): Translates IP addresses to MAC addresses for local communication.
Port and Router Vulnerabilities
- Port Scanning: Checks open ports and listens for data. Attackers can exploit open ports to send malicious data or identify vulnerabilities.
- Port scanning tools (e.g., Nmap) can be used to identify vulnerabilities or applications.
- Vanilla scans check all ports sequentially, strobe scans target specific services.
- Stealth scanning (e.g., fragmented packets) makes probes harder to detect.
- Router vulnerabilities: War driving (unauthorized wireless network access), lack of password, malicious network activities.
Server Vulnerabilities
- Denial-of-Service (DoS) Attacks: Can happen unintentionally due to high server traffic (e.g., website crashes, university registration).
- Service Request Flood: Overloads a server with too many requests, causing it to shut down.
- Bandwidth Flood: Sends requests exceeding the server's bandwidth capacity, causing denial of service.
- SYN Flood: Exploits TCP/IP handshake; overwhelms the server with open connections.
- Security Operation Centers (SOCs): Use tools (firewalls, DMZs, etc.) to monitor and prevent attacks.
Packet Sniffing
- Passive attack; monitors and logs network traffic.
- Packet sniffers capture unencrypted data (e.g., passwords, financial information).
- Hub-based networks make sniffing easier than switch-based networks, although switch-based sniffing is possible with overloaded or promiscuous mode switches.
Spoofing
- Address Resolution Protocol (ARP) spoofing: ARP maps IP addresses to MAC addresses. Attackers can change the IP-to-MAC mapping to reroute traffic to them; tools such as Ettercap can do this.
- DNS spoofing: On the internet, an attacker can use DNS protocol spoofing.
Replay Attacks
- Attackers capture communication (e.g., login credentials), and later replay it to gain unauthorized access.
- Even encrypted data can be vulnerable in replay attacks.
VPNs
- Trusted VPN: Older type, relying on private lines.
- Secure VPN: Most common, using encryption protocols.
- Hybrid VPN: Combination of trusted and secure VPNs.
- VPNs encrypt data packets to prevent unauthorized access.
Encryption
- VPNs encrypt data in transit (transport mode) or as created (tunnel mode).
- Different VPNs use various encryption standards (e.g., AES).
Digital Certificates
- Verifies server identities in TLS (Transport Layer Security).
- Links a server's public key to its identity.
- Issued by a Certificate Authority (CA).
- The CA verifies the server's identity and digitally signs the certificate.
- Servers submit Certificate Signing Requests (CSRs) to the CA.
Transport Layer Security (TLS)
- Foundation of secure internet connections (e.g., HTTPS).
- TLS handshake involves:
- Client sending "Client Hello."
- Server replying with "Server Hello" and digital certificate.
- Both agreeing on encryption key.
- TLS 1.3: Faster and more secure version, uses forward secrecy and stronger cipher suites, removing weaker protocols.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.