1/15
Flashcards covering key concepts related to networking threats and defenses based on the lecture notes.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No analytics yet
Send a link to your students to track their progress
OSI Model
A framework that describes how dissimilar computers can connect on a network, divided into seven layers.
Encapsulation
The process of wrapping data with protocol information at each layer of the OSI model.
Transport Layer
Layer 4 of the OSI model that uses port numbers to address messages to sending/receiving applications.
Network Layer
Layer 3 of the OSI model that uses IP addresses to address messages.
Data Link Layer
Layer 2 of the OSI model that uses MAC addresses to address messages.
Man-in-the-Middle Attack (MITM)
An attack where a threat actor intercepts communication between two parties, either to eavesdrop or alter the conversation.
Session Replay Attack
An attack where a threat actor captures and reuses a session ID to impersonate a user.
ARP Poisoning
An attack that involves sending false ARP messages to associate an attacker's MAC address with the IP address of a legitimate host.
MAC Flooding
An attack that overwhelms a switch with spoofed MAC addresses to cause it to enter fail-open mode.
DNS Poisoning
An attack that modifies DNS records to redirect traffic to malicious sites.
Distributed Denial of Service Attack (DDoS)
An attack that uses multiple compromised devices to flood a target with requests, overwhelming the system.
Physical Security Controls
Measures taken to prevent threats from gaining physical access to networks or devices.
Secure Area
A restricted zone, such as a data center, where access is controlled to protect sensitive equipment and data.
Locks
Physical or electronic devices used to secure doors and prevent unauthorized access.
Fire Suppression
Systems designed to extinguish fires in data centers, often using dry chemicals or clean agents.
Physical Security Limitations
The recognition that while physical security can deter casual attackers, it cannot fully prevent determined intrusions.