Cybersecurity and Network Security Key Concepts for Students

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/125

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

126 Terms

1
New cards

Firewall

These enforce a series of rules defining what kind of network traffic is allowed and what is not allowed

2
New cards

Authentication

The act of verifying the identity of a particular person

3
New cards

What is the difference between a threat and an attack?

Threat is potential - does not need to have occurred

4
New cards

What are the three goals of security?

Prevention, Detection, Recovery

5
New cards

Why is anti-virus not perfect?

Zero-day attacks; Based on signatures for KNOWN malware - lots of variants, etc.

6
New cards

XSS

This occurs when a malicious user utilizes a vulnerable web application to send malicious code to a different end user

7
New cards

File system

This part of the operating system creates and manages files and directories

8
New cards

What is the standard of proof in a criminal case vs a civil case?

Criminal: beyond a reasonable doubt; Civil: preponderance of the evidence AKA more likely than not

9
New cards

What are 4 ways malware can get onto a system?

flashdrives, spam email, emails from infected friends/contacts, malicious websites, infected websites, infected computers on a network, and more

10
New cards

Passwords are stored on a system as these, which vary based on operating system (bonus: how does a system auth a user password attempt?)

Hashes; Bonus: the system will hash the attempt and compare the calculated hash to the stored hash

11
New cards

What is the California Security Breach Act and why is it important?

Requires organizations that maintain PII to inform customers about data breaches - important if you work in the security industry because there are notification requirements and guidelines - STATE GOVERNED

12
New cards

Servers

Systems on a network that include files and/or programs in use by multiple people on or outside a network

13
New cards

Network

Set of devices, software, and cables that enables the exchange of information

14
New cards

Describe two network topologies

Star, Ring, Bus, Mesh

15
New cards

IDS

This device inspects the data of a packet to see if it is malicious in nature

16
New cards

What was the first operating system & service pack to include a firewall enabled by default?

Windows XP SP2

17
New cards

Trojan

Any program that is hidden within another

18
New cards

What is CIA and why is it important?

Confidentiality; Integrity; Availability

19
New cards

What happens when there is not enough RAM for memory?

Virtual memory - AKA pagefile or swapfile

20
New cards

Code Injection

Inserting code into a web application when it should be processing data

21
New cards

OSI or TCP/IP

This model is a set of guidelines used to standardize network processes

22
New cards

What are some examples of layer 6 - presentation?

.doc; .jpg

23
New cards

Thread

The smallest unit of processing that can be scheduled

24
New cards

Phishing

The act of luring a victim to divulge his/her personal or financial information

25
New cards

Program

An executable set of code

26
New cards

Ping

This command is used to test the reachability of a host and measure round-trip time for messages sent from a host to a destination machine

27
New cards

Explain the three way handshake

Hi, I'm here. Are you there. SYN; Yes, I see you're there, I'm here and listening. SYN,ACK; Great! Got your response. Ready to start sending. ACK

28
New cards

What is the purpose of PAR?

Allows receiver to reassemble message and for sender to know which packets may have gotten dropped

29
New cards

What type of user account has complete power over a system?

Super User

30
New cards

Operating System

This part of any computer system is responsible for managing hardware and software resources

31
New cards

Computer Viruses/Worm

Self-replicating computer programs

32
New cards

What does the TCP sliding window do?

Indicates how many segments can be sent before ACK - smaller when the computer is busier and bigger when the computer is idle

33
New cards

What are the 3 three pieces of hardware where data resides on a computer and how long do each of them store it? Bonus: Rank them in order of speed.

CPU - fastest- only holds data for immediate use; RAM - fast - holds data for currently running processes; Hard Drive - slowest - holds data for permanent storage

34
New cards

What is the difference between dynamic and static IP addresses?

Dynamic is assigned via DHCP server/router on the network automatically as hosts connect. Static are assigned by a person to a network interface/system

35
New cards

What are ports?

Like PO boxes - allow the network to direct traffic at a specific program or service

36
New cards

Gateway

A single system in a network that connects to the internet

37
New cards

What are the four layers of the TCP/IP model?

Network, Internet, Transport, Application

38
New cards

What is the different between public and private IP addresses and what is the purpose of each?

Public - purchased from an ISP and paid for - how you connect to the rest of the internet; Private - created by your router within your home network in order to share one public IP address amongst many devices.

39
New cards

What type of encryption uses the same key for encryption and decryption?

Symmetric, DES, AES

40
New cards

What was the first version of Windows designed from a security standpoint? Bonus: What did they do wrong?

Vista; Bonus: went too far to the security side to the point it impacted usability

41
New cards

Name and describe 4 types of malware

spyware, adware, scareware, ransomware, keyloggers

42
New cards

Spearphishing

This is a type of phishing attack aimed at specific inviduals or companies

43
New cards

According to OWASP, this type of web attack is the most common security risk to web applications

Code Injection

44
New cards

Describe the difference between stored and reflected cross site scripting

Stored: code is injected permanently on target servers (databases), victim retrieves malicious script when they request the stored info; Reflected: injected code reflected off of web server. Response includes some or all of input sent to server as part of the request. Delivered to user via email message/other web server, user is Tricked into clicking on malicious link

45
New cards

Social engineering

The science of manipulating human beings to divulge confidential information or take a certain action

46
New cards

What is the difference between top down and bottom up information processing?

Top down: knowledge driven, based on previous experience, goals/expectations drive perception; Bottom up: used when knowledge is lacking, recognition by components, information driven

47
New cards

What are the four steps of a social Engineering attack?

Research, hook, play, exit

48
New cards

Name and describe 4 basic human tendencies

Reciprocity, social proof, consistency, scarcity, liking, authority

49
New cards

Describe the lollipop model vs onion model

Lollipop: perimeter, hard crunchy shell on outside and soft chewy center on inside -> once attacker breaches perimeter, the valuables are exposed; Onion: defense in depth! Layered security architecture that must be peeled away one layer at a time

50
New cards

Access Control Lists (ACLs)

These can be used to control intercommunication between levels of trust

51
New cards

Name and Describe the 4 main components of a secure network topology

Perimeter firewall (between internet and organization); Perimeter network (DMZ- area between perimeter firewall and internal firewall); Internal Firewall (Limits all access to internal network); Internal Network (location of rest of information assets)

52
New cards

Name and describe 6 basic ways to defend your system (both personal and enterprise)

Remove unnecessary hardware, rename admin account and change password, remove unused user accounts, use antivirus and keep it up to date, use software/hardware firewalls, keep OS and applications patched and up to date, use encryption, perform backups routinely, disable USB devices, enforce password policies, set up logging on servers and network, content filtering, application whitelisting, restrict BYOD

53
New cards

Data loss prevention software

This type of software is designed to detect and prevent unauthorized attempts to copy/send sensitive data, intentionally or unintentionally, even if the person is authorized to access the information

54
New cards

Digital Forensics

Using court approved methods to acquire, investigate, and present evidence which allows decision makers to act on knowledge.

55
New cards

Name and describe the difference between the 3 types of investigations

Internal: internal to organization(employee possesses unauthorized documents); Civil: 2 parties in a civil suit(employee sues for wrongful termination); Criminal: criminal lawsuit (employee possesses child porn)

56
New cards

What are the 2 golden rules of forensics?

1.Protect and preserve evidence; 2.Always assume case will go to court

57
New cards

Give a few examples of what are considered "original evidence media"

hard disk, cd rom, SSD, cell phone, tablet, USB flash drive, portable hard drive, email accounts, server

58
New cards

Name one of the items that are required for court admissibility of a hard drive

Bitstream copy (forensic image) of drive; Imaging log recording cryptographic hashes of source drive and image file; Chain of custody document

59
New cards

Info Sec Management

This describes activities relating to protection of information/information assets against risk of loss, misuse, disclosure, or damage and describes controls that organization needs to implement to ensure that risks are being managed

60
New cards

What are some benefits of Risk assessments

Proactive rather than reactive; Help identify vulnerabilities; Help identify threats; Will provide information to form cohesive strategy

61
New cards

What are 2 procedures used for contingency planning

Incident Response (procedure for when infosec incident occurs); Disaster recovery - procedure for when natural/manmade disaster occurs

62
New cards

What are the 3 things that are needed to adequately secure a system? Bonus: What is the weakest link out of the 3?

People, Process, technology; People = Weakest link

63
New cards

Name some characteristics of common law legal systems

Uncodified; Everything is based on precedent; Contest between 2 opposing parties before a judge who moderates; Divided into criminal, civil, and administrative codes; Everyone is innocent until proven guilty

64
New cards

What are the 3 roles of computers in a lawsuit

Computer assisted crime; Computer targeted crime; Computer was incidental

65
New cards

Why is anti-virus not perfect?

Because it's largely signature/known-pattern based, malware variants evolve fast, and "zero-day" malware/vulns can bypass detection

66
New cards

What is a zero-day attack?

An attack that exploits a vulnerability that is unknown to the vendor/public or has no patch available yet (attacked on "day zero" of awareness)

67
New cards

What is a virus?

Malware that attaches to a host file/program and replicates when the host runs (often needs user action to spread)

68
New cards

What is a Trojan?

Malware disguised as legitimate software; it tricks users into running it (typically not self-replicating)

69
New cards

What is a worm?

Self-replicating malware that spreads on its own, often across networks, without needing a host program

70
New cards

What is spyware?

Malware that secretly monitors activity and collects/exfiltrates information (browsing, credentials, files, etc.)

71
New cards

What is adware?

Software that displays unwanted ads and may track user behavior; sometimes bundled with "free" apps

72
New cards

What is scareware?

Fake alerts/warnings designed to scare a user into installing software, paying money, or giving access

73
New cards

What is ransomware?

Malware that encrypts/locks files or systems and demands payment (often a "ransom") to restore access

74
New cards

What is a keylogger?

Malware or a tool that records keystrokes to steal passwords, messages, and other typed data

75
New cards

What is a credential stealer?

Malware that harvests login credentials (usernames/passwords) and may also steal cookies/tokens or saved browser creds

76
New cards

What is a downloader?

Malware whose main job is to fetch and install additional malware payloads onto the system

77
New cards

What is a backdoor?

A hidden method of bypassing normal authentication to regain access to a system later

78
New cards

What is a rootkit?

Malware designed to hide itself and maintain privileged (often admin/root) access, commonly by modifying low-level OS components

79
New cards

What is a RAT?

Remote Access Trojan/Tool: malware that gives an attacker remote control of a victim machine (screen, files, commands, webcam, etc.)

80
New cards

What are some ways that malware can get onto a system?

Phishing attachments/links, malicious downloads, drive-by websites, USB/removable media, infected installers, exploiting unpatched software, compromised network shares, and "trusted" accounts being abused

81
New cards

What is one of the biggest e-mail threats and how does it propagate?

Phishing/social-engineering emails; propagates by tricking users into clicking links, opening attachments, or giving credentials (sometimes spreading to contacts)

82
New cards

What is phishing?

Social engineering that lures a victim into revealing sensitive info (passwords, banking info) or running malicious content by pretending to be a trusted source

83
New cards

What are some ways of identifying phishing threats?

Check sender domain, hover/inspect URLs, look for urgency/threats, poor grammar, unexpected attachments, requests for credentials/payment, mismatched branding, and "too good to be true" offers

84
New cards

What is spearphishing?

Phishing aimed at a specific person/team/company, often using personal details to seem believable

85
New cards

What is SMShing?

Phishing delivered via SMS/text messages (malicious links, fake login pages, etc.)

86
New cards

What are some ways of protecting yourself from malware?

Keep OS/apps patched, use AV/EDR, enable firewalls, avoid unknown links/attachments, disable risky macros, use least privilege, use MFA, back up data, and keep good security awareness habits

87
New cards

What is a SQL injection?

Injecting malicious SQL into an app's input so the database executes unintended commands (read/modify/delete data, bypass logins, etc.)

88
New cards

What is stored XSS?

Cross-site scripting where malicious script is stored on the server (e.g., database/comment field) and served to victims later

89
New cards

What is reflected XSS?

XSS where malicious input is reflected immediately in a web response (often via a crafted link) and runs in the victim's browser

90
New cards

What are rogue access points?

Unauthorized wireless access points connected to a network (or "evil twins") that can bypass controls or intercept traffic

91
New cards

What are Bluetooth attacks?

Attacks abusing Bluetooth pairing/protocol weaknesses to eavesdrop, track devices, inject data, or gain unauthorized access

92
New cards

What are wireless driver attacks?

Attacks exploiting vulnerabilities in Wi-Fi/network drivers or firmware (can lead to crashes, privilege escalation, or remote code execution)

93
New cards

What is Social Engineering?

Manipulating people to divulge confidential info or perform actions they normally shouldn't (e.g., give passwords, run software, transfer money)

94
New cards

What are the types of Information Processing

Top-down (knowledge/expectations-driven perception) vs Bottom-up (data/component-driven recognition when knowledge is limited)

95
New cards

What are the Basic Human Tendencies?

Common "levers" attackers use: reciprocity, social proof, consistency/commitment, scarcity, liking, authority

96
New cards

What are some telltale signs of social engineering?

Urgency, secrecy, bypassing policy, unusual requests, emotional pressure, unexpected contact, requests for credentials, and "verify later" behavior

97
New cards

What are the steps of a Social Engineering attack?

Research (gather info), Hook (initial contact), Play (exploit trust to get action/info), Exit (leave before suspicion; cover tracks)

98
New cards

What are the two security models and which would you recommend?

Lollipop (hard perimeter, soft inside) vs Onion (layered defense/defense-in-depth); recommend Onion because it limits damage after a breach

99
New cards

Rings of Trust

Layered trust zones (inner rings more trusted); access becomes more restricted as you move inward

100
New cards

Perimeter Firewall

Firewall at the edge of the organization network that filters traffic between the internet and the organization