Networking Threats and Defenses

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/15

flashcard set

Earn XP

Description and Tags

Flashcards covering key concepts related to networking threats and defenses based on the lecture notes.

Last updated 9:31 PM on 4/17/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

16 Terms

1
New cards

OSI Model

A framework that describes how dissimilar computers can connect on a network, divided into seven layers.

2
New cards

Encapsulation

The process of wrapping data with protocol information at each layer of the OSI model.

3
New cards

Transport Layer

Layer 4 of the OSI model that uses port numbers to address messages to sending/receiving applications.

4
New cards

Network Layer

Layer 3 of the OSI model that uses IP addresses to address messages.

5
New cards

Data Link Layer

Layer 2 of the OSI model that uses MAC addresses to address messages.

6
New cards

Man-in-the-Middle Attack (MITM)

An attack where a threat actor intercepts communication between two parties, either to eavesdrop or alter the conversation.

7
New cards

Session Replay Attack

An attack where a threat actor captures and reuses a session ID to impersonate a user.

8
New cards

ARP Poisoning

An attack that involves sending false ARP messages to associate an attacker's MAC address with the IP address of a legitimate host.

9
New cards

MAC Flooding

An attack that overwhelms a switch with spoofed MAC addresses to cause it to enter fail-open mode.

10
New cards

DNS Poisoning

An attack that modifies DNS records to redirect traffic to malicious sites.

11
New cards

Distributed Denial of Service Attack (DDoS)

An attack that uses multiple compromised devices to flood a target with requests, overwhelming the system.

12
New cards

Physical Security Controls

Measures taken to prevent threats from gaining physical access to networks or devices.

13
New cards

Secure Area

A restricted zone, such as a data center, where access is controlled to protect sensitive equipment and data.

14
New cards

Locks

Physical or electronic devices used to secure doors and prevent unauthorized access.

15
New cards

Fire Suppression

Systems designed to extinguish fires in data centers, often using dry chemicals or clean agents.

16
New cards

Physical Security Limitations

The recognition that while physical security can deter casual attackers, it cannot fully prevent determined intrusions.