CSIT-460 Computer Security – Lecture 12: Network Security

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/44

flashcard set

Earn XP

Description and Tags

These flashcards cover key concepts from Lecture 12 on network security, including networking basics, IP addressing, OSI layers, ARP and ARP spoofing, routing, IP spoofing, ICMP, TCP operations and attacks, Ethernet fundamentals, and related defenses.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

45 Terms

1
New cards

What is a computer network?

A collection of two or more computing devices interconnected to exchange data and share resources.

2
New cards

In networking, what are “nodes”?

Individual devices (computers, printers, servers, etc.) connected to the network.

3
New cards

Which OSI layer does IP operate at?

Layer 3 – the Network layer.

4
New cards

How many bits are in an IPv4 address and give an example format.

32 bits; example format 192.168.1.1

5
New cards

How many bits are in an IPv6 address and give an example format.

128 bits; example format 2001:0db8:85a3::8a2e:0370:7334

6
New cards

What portion of 192.168.1.1/24 identifies the network?

The first 24 bits (192.168.1).

7
New cards

Which addressing technique replaced classful addressing for efficient allocation?

CIDR – Classless Inter-Domain Routing.

8
New cards

Give one private IPv4 network range commonly used in home LANs.

192.168.0.0/16 (e.g., 192.168.1.0/24).

9
New cards

What is the default subnet mask for a Class C network?

255.255.255.0 (/24).

10
New cards

What special IP address is reserved for loopback testing?

127.0.0.1

11
New cards

Which protocol translates domain names like example.com into IP addresses?

DNS – Domain Name System.

12
New cards

List the seven OSI layers from top to bottom.

Application, Presentation, Session, Transport, Network, Data Link, Physical.

13
New cards

At which OSI layer are port numbers added to a segment?

Layer 4 – Transport.

14
New cards

What two main pieces of information are added at the Network layer?

Source IP address and destination IP address.

15
New cards

Which address is resolved/used at the Data Link layer?

The MAC (Media Access Control) address.

16
New cards

What is a MAC address?

A 48-bit hardware identifier for a network interface, displayed as six hexadecimal pairs (e.g., 00:16:B7:29:E4:7D).

17
New cards

Can a MAC address be changed? If so, how?

Yes; it can be software-modified via the NIC driver (locally administered address).

18
New cards

What does ARP stand for and what is its purpose?

Address Resolution Protocol; it maps IP addresses (Layer 3) to MAC addresses (Layer 2) on a local network.

19
New cards

Describe the two basic ARP messages exchanged.

ARP Request (broadcast): "Who has this IP?" and ARP Reply (unicast): "Here is the MAC for that IP."

20
New cards

Why is ARP vulnerable to spoofing?

Because hosts trust unsolicited ARP replies and update their caches without authentication.

21
New cards

Explain ARP spoofing in one sentence.

An attacker sends forged ARP messages linking their MAC to a legitimate IP to redirect traffic through themselves.

22
New cards

Name one defense technique against ARP spoofing.

Static ARP tables, LAN access restriction, monitoring for duplicate MACs, or ARP packet inspection.

23
New cards

What is IP routing?

The process of forwarding IP packets from source to destination across interconnected networks.

24
New cards

When will a host send a packet directly over the LAN instead of to the default gateway?

When the destination IP is on the same subnet.

25
New cards

Define IP spoofing.

Forging the source IP address in packet headers to impersonate another device or hide identity.

26
New cards

Give one attack type that commonly uses IP spoofing.

DDoS amplification attacks, man-in-the-middle, or bypassing IP-based authentication.

27
New cards

What protocol number and diagnostic tool rely on ICMP?

ICMP protocol (e.g., tools like ping and traceroute).

28
New cards

Name one reason administrators often restrict ICMP at boundaries.

To prevent abuse such as ICMP floods, ping of death, or network scanning.

29
New cards

Is TCP connection-oriented or connectionless?

Connection-oriented.

30
New cards

What three steps make up the TCP three-way handshake?

SYN, SYN-ACK, ACK.

31
New cards

Which TCP feature prevents overwhelming a receiver with data?

Flow control (using the receive window).

32
New cards

What is a SYN flood?

A DoS attack that sends many SYNs without completing the handshake, exhausting server resources with half-open connections.

33
New cards

Name one defense against SYN flood attacks.

SYN cookies, rate limiting, firewall/IDS filtering excessive SYNs.

34
New cards

What flag is set in a packet used to perform a TCP reset attack?

RST flag.

35
New cards

How does encryption (TLS/HTTPS) help defend against TCP reset attacks on video streams?

It hides sequence numbers, preventing attackers from crafting valid RST packets.

36
New cards

What does ingress filtering try to block?

Packets entering a network with spoofed (illegitimate) source IP addresses.

37
New cards

Which Ethernet standard defines the physical and Data Link specs widely used today?

IEEE 802.3

38
New cards

What is an Ethernet collision and how is it mitigated?

Simultaneous frame transmissions on the same segment; Ethernet employs a random-wait (CSMA/CD) strategy to retransmit.

39
New cards

Define a network segment in Ethernet terminology.

A portion of a LAN where devices share the same logical connection and collision domain.

40
New cards

Which OSI layer converts raw bit streams to signals over physical media?

Layer 1 – Physical.

41
New cards

Give one example of a physical transmission medium.

Twisted-pair cables, fiber optics, or Wi-Fi radio waves.

42
New cards

Why can TCP suffer high latency for short-lived connections?

Because the three-way handshake adds at least one and a half round-trip times before data transfer.

43
New cards

Name one modern protocol or option designed to reduce TCP handshake latency.

TCP Fast Open (TFO) or QUIC (UDP-based).

44
New cards

What tool command shows a device’s current ARP cache on most systems?

arp -a

45
New cards

Which OSI layers are most often targeted by buffer overflow or CSRF attacks?

Application layer (Layer 7).