D315 Network Security and Foundations

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/169

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

170 Terms

1
New cards

What is Layer 1 (OSI) responsible for?

Transmitting raw bit stream over the physical medium

2
New cards

What does the Physical Layer include?

Only hardware-based components and no protocols

3
New cards

What are the devices for the Physical Layer?

Cables, Hubs, Repeaters, NICs

4
New cards

What is the main function of Layer 2 in the OSI model?

AKA Data Link Layer; Provides node-to-node data transfer; packages data into frames

5
New cards

What are some devices that operate at Layer 2?

Switches, bridges, NICs

6
New cards

Name some protocols associated with Layer 2.

Ethernet, PPP, HDLC, ARP

7
New cards

What is the Ethernet protocol?

A family of standard local networking protocols describing how data should be formatted for transmission between computers on the same network; AKA 802.3; inc the collision protocol CSMA/CD

8
New cards

What is the PPP protocol?

Point-to-Point Protocol: how routers communicate to each other in a P2P scenario; considered legacy; used for dial-up modems, DSL connections, and other point-to-point communication links.

9
New cards

What is the HDLC protocol?

High Data Link Control: used to frame data, controlling the flow of data across point-to-point and multipoint communication links; inc error detection and flow control; useful mainly in WANs

10
New cards

What is the ARP protocol?

Links IP addresses to MAC addresses; vulnerable to cyber attack (ARP Spoofing/Poisoning)

11
New cards

What is the main function of Layer 3 in the OSI model?

Network Layer: determined how data is sent to the receiving devices, routing and forwarding of packets

12
New cards

What are some devices that operate at Layer 3?

Routers, Layer 3 switches, Firewalls

13
New cards

Name some protocols associated with Layer 3.

IP, ICMP, IPSec, IGMP, IPX

14
New cards

What is the IP protocol?

The Internet Protocol (IP) is the fundamental communication protocol used for relaying data packets across networks, ensuring they reach the correct destination based on IP addresses. It defines the format of data packets and handles addressing, routing, and fragmentation to facilitate communication between devices on different networks.

15
New cards

What is the ICMP protocol?

The Internet Control Message Protocol (ICMP) is used for sending error messages and operational information, such as when a service is unavailable or a device cannot be reached. It's commonly used by tools like "ping" to test network connectivity and diagnose communication issues.

16
New cards

What is the IPSec protocol?

IPSec (Internet Protocol Security) is a protocol suite used to secure IP communications by authenticating and encrypting each IP packet in a data stream. It provides secure, private communication over IP networks, such as the internet, and is commonly used in Virtual Private Networks (VPNs).

17
New cards

What is the IGMP protocol?

The Internet Group Management Protocol (IGMP) is used by devices and routers on a network to manage membership in multicast groups, enabling efficient transmission of data to multiple recipients simultaneously. It helps optimize network traffic by ensuring that only devices interested in receiving multicast data are sent those transmissions.

18
New cards

What is the IPX protocol?

The Internetwork Packet Exchange (IPX) protocol was used primarily in Novell NetWare networks for routing data packets between devices. It provided fast, connectionless communication but has largely been replaced by the more universal TCP/IP protocol suite in modern networks.

19
New cards

What is layer 4 of the OSI model?

Transport Layer: provides transparent transfer of data between end systems, or hosts, and is responsible for end-to-end recovery and flow control

20
New cards

What are the protocols associated with the Transport Layer?

TCP, UDP

21
New cards

What is the TCP protocol?

communications standard that allows computing devices and application programs to exchange messages over a network. It's a transport protocol that works on top of Internet Protocol (IP) to ensure that packets are transmitted reliably.

22
New cards

What is the UDP protocol?

UDP is the User Datagram Protocol and is based on Datagrams. Mainly, it is used for multicasting and broadcasting. Its functionality is almost the same as TCP/IP Protocol except for the three ways of handshaking and error checking. It uses a simple transmission without any hand-shaking which makes it less reliable.

23
New cards

What is Layer 5 of the OSI model?

Session Layer: manages sessions between applications; establishes, manages, and terminates connections between applications

24
New cards

What are the protocols associated with the Session Layer

NetBIOS, PPTP, SMB, NFS

25
New cards

What is the NetBIOS protocol?

Network Basic Input/Output System is a legacy network protocol that enables communication between computers and devices within a local area network (LAN). Originally developed by IBM in the early 1980s, NETBIOS was widely used in earlier versions of Microsoft Windows operating systems and networks.; SUPERCEDED BY SMB AND DNS

26
New cards

What is the PPTP protocol?

Point-to-Point Tunneling Protocol enables the secure transfer of data from a remote client to a private enterprise server by creating a virtual private network (VPN) across TCP/IP-based data networks.

27
New cards

What is the SMB protocol?

The Server Message Block (SMB) protocol is a client-server communication protocol that is used for shared access to files, directories, printers, serial ports, and other resources on a network.

28
New cards

What is the NFS protocol?

The Network File System (NFS) protocol allows a user on a client computer to access files over a network in the same way they would access a local storage file; open source

29
New cards

What is Layer 6 of the OSI Model?

Presentation Layer: translates data between the application layer and the network format; data encryption and compression occurs here

30
New cards

What are the protocols associated with the Presentation Layer?

SSL, TLS, JPEG, MPEG

31
New cards

What is the SSL protocol?

Secure Sockets Layer (SSL) is a communication protocol that encrypts data and establishes a secure connection between two devices or applications on a network; often used to secure communications between a client and a server, such as a website and a browser, but it can also be used to secure email, VoIP, and other communications.; SUPERCEDED BY TLS

32
New cards

What is the TLS protocol?

Transport Layer Security, or TLS, is a widely adopted security protocol designed to facilitate privacy and data security for communications over the Internet. A primary use case of TLS is encrypting the communication between web applications and servers, such as web browsers loading a website.; SUPERCEDED SSL

33
New cards

What is the JPEG protocol?

JPEG, which stands for Joint Photographic Experts Group, is a standardized file format for digital images that uses lossy compression to save space.

34
New cards

What is the MPEG protocol?

The MPEG protocol is a digital container format that can be used to transmit and store audio, video, and Program and System Information Protocol (PSIP) data. MPEG is a popular audio and video compression technique

35
New cards

What is Layer 7 of the OSI model?

Application Layer; serves as the window for users and application processes to access network services

36
New cards

What are devices considered at Layer 7 of the OSI model?

Gateways, Proxies

37
New cards

What are the protocols associated with the Application Layer?

HTTP, FTP, SMTP, DNS, DHCP, TELNET

38
New cards

What is the HTTP protocol?

Hypertext Transfer Protocol (HTTP) is the foundation of the World Wide Web, and is used to load webpages using hypertext links. HTTP is an application layer protocol designed to transfer information between networked devices and runs on top of other layers of the network protocol stack.; vulnerable (unencrypted) so now people use HTTPS (HTTP running over TLS)

39
New cards

What is the FTP protocol?

(File Transfer Protocol) is a standard network protocol used for the transfer of files from one host to another over a TCP-based network, such as the Internet.; vulnerable (unencrypted) so now people use SFTP (FTP being used over SSH protocol)

40
New cards

What is the SMTP protocol?

Simple Mail Transfer Protocol (SMTP) is a communication protocol that allows users to send and receive email messages over the internet

41
New cards

What is the DNS protocol?

Domain Name System (DNS) protocol is a core network service that allows users to navigate the internet using domain names instead of IP addresses. DNS translates domain names into IP addresses so that web browsers can load internet resources

42
New cards

What is the DHCP protocol?

Dynamic Host Configuration Protocol (DHCP) is a networking protocol for dynamically assigning IP addresses to each host on your organization's network. DHCP also assigns Domain Name System (DNS) addresses, subnet masks, and default gateways.; VULNERABLE

43
New cards

Why does the DHCP protocol attract cyber attacks?

  1. it can only assign a certain number of IP addreses -> attackers can overwhelm the DHCP server by attempting to connect multiple devices to connect to the network

  1. automatically assigns IP address without checking the device requesting to connect to the network

  1. unauthorized DHCP servers can provide wrong information to clients

  1. Unauthorized clients can also intercept DHCP servers and gain information about resources

***More secure to disable DHCP and have a security admin allocate IP addresses to devices in the network

44
New cards

What is the TELNET protocol?

protocol that allows you to connect to remote computers (called hosts) over a TCP/IP network; manage devices remotely over the internet or other networks; SUPERCEDED BY SSH

45
New cards

What is the acronym to remember the OSI model?

APSTNDP; All People Seem To Need Data Processing

46
New cards

What is Layer 1 of the TCP/IP Model?

Link or Network Interface Layer; handles physical and logical connections to hardware; responsible for how data is physically transmitted over the network, including defining the electrical, mechanical, procedural, and functional specifications for activating, maintaining, and deactivating the physical link bw communicating network systems

47
New cards

What are the devices associated with the Link/Network Interface Layer?

NICs, Switches, Other networking hardware

48
New cards

What are the protocols associated with the Link/Network Interface Layer?

Ethernet, ARP, PPP

49
New cards

What is Layer 2 of the TCP/IP model?

Internet/Network Layer: provides internetworking, addressing and routing; responsible for sending packets from any network, and they can pass through multiple routers to reach any other network

50
New cards

What are the devices associated with the Internet/Network Layer?

Routers, Layer 3 switches

51
New cards

What are the protocols associated with the Internet/Network Layer?

IP, ICMP, IPSec, IGMP

52
New cards

What is Layer 3 of the TCP/IP Model?

Transport Layer; responsible for end-to-end communication services for applications; provides services like connection-oriented communication, reliability, flow control, and multiplexing

53
New cards

What are the protocols associated with the Transport Layer of the TCP/IP model?

same as the ones in the OSI model: TCP and UDP

54
New cards

What is Layer 4 of the TCP/IP model?

Application Layer: closest to end user; both end-user and application layer processes interact with the transport layer to send and receive data; provides application services for file transfers, e-mail, and other network software services

55
New cards

What are the protocols associated with the Application Layer of the TCP/IP Model?

HTTP, FTP, SMTP, DNS, DHCP, SNMP

56
New cards

What is the SNMP protocol?

Simple Network Management Protocol (SNMP) is an internet standard protocol used to monitor and manage network devices connected over an IP. SNMP is used for communication between routers, switches, firewalls, load balancers, servers, CCTV cameras, and wireless devices; considered layer 7 of OSI and layer 4 of the TCP/IP models

57
New cards

What is the ping command?

Windows/Linux; sends an ICMP echo request and listens for a reply; if reply received it will display time it took and Time To Live (TTL) left; useful for troubleshooting network performance issues

58
New cards

What is the traceroute command?

Linux; trace route an IP packet takes to destination; displays each hop (next router) in numerical list with hop address and time to receive packet; useful for troubleshooting; STALKER

59
New cards

What is the tracert command?

Windows version of the traceroute; STALKER

60
New cards

What is the tracepath command?

Linux; similar to traceroute but it is available for every user instead of just the superuser; STALKER RATED E FOR EVERYONE

61
New cards

What is the ipconfig command?

Windows

  • It provides the user with the IP, subnet masks, and default gateway for each network adapter.

  • identifies misconfigured network settings or discrepancies among the IP, DNS, or default gateway addresses

  • examine DNS cache as evidence of possible communication to malicious domains, and can clear DNS cache

  • It can be used to replace all connections and renew all adapters via the /release command

  • can use ping or tracert commands by finding the IP address from this command

62
New cards

What is the ifconfig command?

Linux; similar to ipconfig

  • implemented at time of boot to configure kernel network interfaces; also used in debugging or tuning

63
New cards

What is the arp command?

Windows & Linux; Address Resolution Protocol; displays the IP to MAC address mapping for hosts discovered in ARP cache; used to add, remove, modify entries in ARP cache

64
New cards

What is the netstat command?

Windows & Linux

-an, -b, and -e

displays info about network adapters, active ports and their state; useful for troubleshooting

65
New cards

What is the netstat - an command?

displays all the connections and their states

66
New cards

What is the netstat - b command?

see all the executable files that are involved in the connections; can use this information to look for connections that use ports that are not associated with any known service or application

67
New cards

What is the netstat - e command?

you can see all the number of failed or discarded network packets -> can indicate a network problem or an attack

68
New cards

What is the dig command?

Linux & Windows pre 10 (otherwise must install)

used to query DNS name servers, looks up and displays answers from query; provides more thorough information than nslookup

69
New cards

What is the nslookup command?

Windows & Linux

displays and troubleshoots DNS info/problems; displays names to UP address mapping

70
New cards

What is the whois command?

Windows & Linux

look up who owns domain or block of IP addresses; shows name, email, physical address but info may be private

71
New cards

What is the route command?

Windows & Linux

display current route tables on host, or add or remove routes; determines where to send traffic (0.0.0.0 is default gateway, where router sends things if not defined in routing table); can be used to manually enter default gateway for a computer; GPS for network traffic

72
New cards

What is the scp command?

Linux; Secure Copy Protocol; used to securely copy files between servers, using SSH (Secure Shell) for auth and encryption; simpler than FTP (for local and remote hosts)

73
New cards

What is the ftp command?

Windows & Linux; copies file(s) from one host to another; data is unencrypted, but FTPS uses SSL/TLS if need encryption; uses TCP for reliability

74
New cards

What is the tftp command?

Windows (if enabled) & Linux

Trivial File Transfer Protocol: transfers a file either way between a client and a server using UDP (User Data Protocol); only used on reliable (local) networks; only ability is to upload and download files without the ability to see which files exist or manage them; no authentication procedures; uses port 69/UDP

75
New cards

What is the finger command?

Linux

displays info about user(s) on remote system, including log in time and username

76
New cards

What is the nmap command?

Linux & Windows

Network Mapper; scans networks to find hosts and open ports

77
New cards

What is the tcpdump command?

Linux; displays TCP/IP and other packets transmitted over network system; form of protocol analyzer (sniffer), designed to show contents of network packets in a human readable form for troubleshooting, security, etc

78
New cards

What is the telnet/ssh command?

allow user to manage accounts and devices remotely; main difference is that SSH is encrypted (more secure)

79
New cards

What is the cat command?

allows you to create single or multiple files, view content of a file, concatenate files and redirect output in terminals or files

80
New cards

What is Wireshark?

tool used to capture packets as they go across the network; can help with troubleshooting networks that have performance issues

81
New cards

What is SQL injection?

Attack consisting of the insertion or injection of an SQL query via input data from the client to a web application; Layer 7

82
New cards

What is the mitigation against SQL injection?

  • Review source code & validate all user-entered data

  • Firewall: use reverse proxy system and scan incoming packets for malicious behavior

  • Enable NX-bit (no-execute) functionality on physical computer

  • Firewall: use reverse proxy system and scan incoming packets for malicious behavior

83
New cards

What is Buffer Overflow?

Layer 7

  • similar to SQL injection

  • enter too much information into the input box which causes the app to crash or other damage; Layer 7

84
New cards

What is the mitigation to Buffer Overflow?

  • Coding to prevent too much input

  • Firewall: prevents suspicious data from being sent

  • Enable NX-bit (no execute) functionality on physical computer

85
New cards

What is the MITM attack?

A MITM or Man-in-the-Middle is a type of attack where an attacker intercepts communication between two persons. The main intention of MITM is to access confidential information.

86
New cards

What is the mitigation for a MITM attack?

uses IP spoofing at its base but gains control by choosing sessions from one or more layers to be hijacked

  • IPS or IPSec protocol can help

87
New cards

What is ARP Spoofing/Poisoning?

Attacker sends fake ARP messages to a network; tricks devices into sending data to the wrong MAC address

88
New cards

How to mitigate against ARP Spoofing/Poisoning?

  • Use packet-filtering with web application firewalls

  • Monitor network traffic for unusual ARP messages

  • Use a VPN

89
New cards

What is VLAN Hopping?

method of attacking networked resources on a virtual LAN (VLAN); attacking host on a VLAN gains access to traffic on other VLANs that would normally not be accessible; occurs at Layer 2 of the OSI model

90
New cards

How to mitigate against VLAN Hopping?

Configure the switch Access Control File

91
New cards

What is a DoS attack?

A denial of service attack; a form of active attack where a hacker tries to stop users from accessing a part of a network or a website. They often involve flooding the network with useless traffic making it slow or inaccessible.; usually with TCP or UDP packets

92
New cards

How to mitigate against a DoS/DDoS attack?

DDoS attack blocking AKA blackholing

  • method used by ISPs to stop a DDoS attack on one of its customers

  • method used by ISPs to stop a DDoS attack on one of its customers

93
New cards

What is a DDoS attack?

Distributed Denial of Service; An attacker recruits zombie systems ahead of time to simultaneously release a flood of traffic at a specific target; targeted network is then bombarded with packets from multiple locations

94
New cards

What is the Ping of Death?

attacker pings the target & sends a ICMP packet over the max of 65,535 bytes and causes the victim's system to crash or stop functioning; causes buffer overflow and crashes; occurs at Layer 3

95
New cards

How to mitigate against Ping of Death?

  • Update Operating Systems

  • Configure Web Application Firewall to drop malformed packets

96
New cards

What is the Ping Flood?

Starts with Ping Sweep***

Attacker overwhelms the victim's computer with a large amount of ICMP echo requests (pings)

97
New cards

What is the Ping Sweep?

information gathering technique used by attackers to ID live hosts by pinging them***usually followed by Ping Flood

98
New cards

How to mitigate against Ping Sweep/Flood?

  • Configure firewall to disallow pings (stops outside attacks not inside)

  • Use intrusion prevention systems at network and hosts levels

99
New cards

What is a SMURF attack?

Spoofs the source address. Use direct broadcast to launch attacks through amplifying network

100
New cards

How to mitigate against SMURF attack?

  • Disable IP-directed broadcasts on your router

  • Reconfigure your operating system to disallow ICMP responses to IP broadcast requests

  • Reconfigure the perimeter firewall to disallow pings originating from outside your network