024 Network and Service Security -  024.2 Network and Internet Security (weight: 3)
27 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the primary function of a botnet?

  • To execute DDoS attacks and other malicious activities (correct)
  • To establish secure connections between devices
  • To enhance packet filtering capabilities
  • To protect networks from intrusion attempts
  • How do attackers typically gain control over computers to form a botnet?

  • By employing robust firewalls
  • By exploiting software vulnerabilities or using malware (correct)
  • Through user consent in software installations
  • Through direct physical access
  • What role does a 'Command-Server' play in a botnet?

  • It prevents unauthorized access to the botnet.
  • It secures the communication of the botnet.
  • It monitors the performance of all devices in the network.
  • It allows the attacker to send instructions to the compromised systems. (correct)
  • What is a function of packet filtering?

    <p>To define which packets can pass through a router based on IP addresses and ports</p> Signup and view all the answers

    Which statement accurately describes the nature of the IPv4 Internet regarding system vulnerabilities?

    <p>It is regularly scanned for computers with specific services and vulnerabilities.</p> Signup and view all the answers

    What is a primary target of attacks on local networks?

    <p>To access and view transmitted data</p> Signup and view all the answers

    What does 'Link Layer Access' refer to?

    <p>Access to the physical transmission medium of a network</p> Signup and view all the answers

    What is required to access a wired network?

    <p>Physical access to a network port</p> Signup and view all the answers

    Why should only active network ports be enabled in a wired network?

    <p>To reduce potential security vulnerabilities</p> Signup and view all the answers

    What makes WLAN networks distinct from wired networks?

    <p>Data is transmitted via radio signals</p> Signup and view all the answers

    What is a necessary precaution when connecting devices to unknown networks?

    <p>Avoid connecting indiscriminately</p> Signup and view all the answers

    What should be done to protect data transmission in WLANs?

    <p>Encrypt data during transmission</p> Signup and view all the answers

    How does access to the link layer benefit an attacker?

    <p>Enables them to communicate and intercept data</p> Signup and view all the answers

    What is the primary vulnerability of WEP encryption in wireless networks?

    <p>It is outdated and easily compromised.</p> Signup and view all the answers

    Which of the following encryption standards is currently the most secure for WLAN networks?

    <p>WPA2</p> Signup and view all the answers

    What significant risk is associated with public WLANs?

    <p>They use unencrypted data transmission.</p> Signup and view all the answers

    In a captive portal setup, what typically occurs after a device connects to the network?

    <p>A redirection to a user agreement page.</p> Signup and view all the answers

    How can an attacker perform a Man in the Middle (MitM) attack?

    <p>By impersonating a legitimate network.</p> Signup and view all the answers

    How do Denial of Service (DoS) attacks primarily affect a target?

    <p>By overloading it with requests.</p> Signup and view all the answers

    What distinguishes a Distributed Denial of Service (DDoS) attack from a regular DoS attack?

    <p>DDoS uses multiple compromised systems to launch the attack.</p> Signup and view all the answers

    What happens to data when it is transmitted over an unencrypted WLAN?

    <p>It can be easily intercepted.</p> Signup and view all the answers

    Why should users be cautious about connecting to unknown networks?

    <p>They can attempt to access user data.</p> Signup and view all the answers

    What can an attacker do if they gain access to a network's infrastructure?

    <p>They can redirect data traffic.</p> Signup and view all the answers

    What should users check before connecting to a public Wi-Fi network?

    <p>The network's encryption standards.</p> Signup and view all the answers

    What is a common method for executing a Man in the Middle attack in a Wi-Fi context?

    <p>Creating a rogue Wi-Fi network with a familiar SSID.</p> Signup and view all the answers

    In a Denial of Service attack, what is one potential outcome for the targeted service?

    <p>The service may crash and become unavailable.</p> Signup and view all the answers

    Where can data interception occur when transmitting information?

    <p>Anywhere along the transmission path.</p> Signup and view all the answers

    Study Notes

    Local Network Attacks

    • Networks are central to data transmission and are vulnerable to various attacks aimed primarily at data interception.
    • Other goals include influencing communication and exploiting network access for unauthorized activities against third parties.
    • Access to network transmission media is essential for data snooping, known as Link Layer Access; accessibility varies by medium and network configuration.

    Wired Network Security

    • Physical access to network ports is required to connect to wired networks, often widely distributed in buildings.
    • Only necessary network ports should be activated, and configurations may require authentication for usage.
    • Once a device connects to a network, it can be addressed by other devices; caution is advised when connecting to unknown networks.

    WLAN Security

    • WLANs transmit data wirelessly, making signals susceptible to interception by anyone within range.
    • Cleartext transmissions should be treated as public, emphasizing the need for encryption of WLAN data.

    WLAN Encryption Standards

    • WEP (Wired Equivalent Privacy): An outdated, insecure standard that is easily attacked.
    • WPA (Wi-Fi Protected Access): A successor to WEP that is currently considered secure.
    • WPA2: The modern standard utilizing advanced cryptographic measures, supporting both shared and individual access modes.

    Public WLAN Risks

    • Public WLANs, often found in cafes and public transport, may lack encryption, leaving data exposed during transmission.
    • Access typically redirects users to a "Captive Portal," where agreement to terms is required for access.
    • Common passwords for such networks can facilitate attacks, as multiple users share the same access credentials.

    Risks of Connecting to Unknown Networks

    • Connecting to an unknown network may enable other participants to establish connections with the device and access hosted services.
    • Attackers can mimic existing networks (ex: restaurants) to trick users into connecting, utilizing common passwords to gain access.

    Internet Attacks

    • Data interception can happen at various points in the transmission process, including routers, switches, and access points.
    • Attacks like Man in the Middle (MitM) can occur when an attacker captures and possibly alters traffic between two parties.

    Man in the Middle Attacks (MitM)

    • In MitM scenarios, attackers can intercept unencrypted communications, capturing sensitive information like login credentials.
    • Multiple methods exist for MitM attacks, including physical network access, eavesdropping on wireless traffic, or controlling network infrastructure.

    Denial of Service Attacks (DoS)

    • DoS attacks aim to disrupt the service of the targeted system, potentially through causing crashes or manipulating data.
    • Disruption methods include severing access to networks or databases, leading to usability issues.

    Distributed Denial of Service Attacks (DDoS)

    • DDoS attacks utilize multiple systems to overwhelm a target with a flood of requests, seeking to exhaust network capacity.
    • Such attacks typically involve thousands of compromised machines working collectively.

    Botnets

    • Botnets consist of numerous compromised computers under a single control entity, often used for executing DDoS attacks.
    • Computers are infected via malware or by exploiting vulnerabilities, connecting to a command server for instructions.
    • Besides DDoS attacks, botnets can facilitate spam distribution, data exchange, and as intermediaries for further attacks.

    Packet Filtering

    • Internet-connected systems are continuously targeted for vulnerabilities, with automated scans for weaknesses in services advertised via DNS.
    • Packet filters use IP addresses and ports to manage the flow of data packets, allowing or rejecting traffic on routers, helping to block illegitimate access before it reaches the network.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    More Like This

    Use Quizgecko on...
    Browser
    Browser