Computer Networks and Security

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/147

flashcard set

Earn XP

Description and Tags

Flashcards covering key vocabulary terms from the lecture notes on computer networks and security.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

148 Terms

1
New cards

Computer Networks

A collection of connected devices that can communicate with each other.

2
New cards

Computer Networking

Connecting computing devices to enable transmission and exchange of information and resources.

3
New cards

LAN (Local Area Network)

Devices connected in a single, limited physical location.

4
New cards

MAN (Metropolitan Area Network)

Connects a larger area, such as a city, by connecting multiple LANs.

5
New cards

WAN (Wide Area Network)

A collection of LANs or other networks that communicate with each other.

6
New cards

The Internet

The largest WAN, a network of networks spanning the entire world.

7
New cards

Security

Protection from harm or the state of feeling safe.

8
New cards

Network Security

Protects a network's infrastructure from unauthorized access, theft, and misuse.

9
New cards

Network Administrator

Manages network operations, troubleshoots issues, manages user access, and ensures network security.

10
New cards

Network Architect

Designs network structure, including hardware, software, and protocols, considering scalability.

11
New cards

Network Analyst

Analyzes network performance and recommends improvements.

12
New cards

Network Engineer

Focuses on the technical aspects of network design and implementation such as routers, switches, and firewalls.

13
New cards

CCNA (Cisco Certified Network Associate)

Networking fundamentals certification.

14
New cards

CCNP (Cisco Certified Network Professional)

Expands skills and understanding of networking.

15
New cards

CCIE (Cisco Certified Internetwork Expert)

For senior networking professionals who design, build, implement, maintain, and troubleshoot complex enterprise networking infrastructures.

16
New cards

CompTIA Network+

Vendor-neutral certification covering networking basics.

17
New cards

JNCIA-Junos (Juniper Networks Certified Associate - Junos)

Associate-level certification for Juniper Networks technologies.

18
New cards

CISSP (Certified Information Systems Security Professional)

Demonstrates experience in IT security and cybersecurity program management.

19
New cards

CISA (Certified Information Systems Auditor)

Expertise in assessing security vulnerabilities and designing/implementing controls.

20
New cards

CISM (Certified Information Security Manager)

Expertise in the management side of information security.

21
New cards

Routers

Connects multiple devices to a network, allowing them to communicate, and directs data packets between them.

22
New cards

Switches

Connects multiple devices on a single network, controlling the flow of data to the correct destination.

23
New cards

Access Points (AP)

Facilitates wireless devices connecting to a wired network.

24
New cards

Servers

A computer or system that provides resources, data, services, or programs to other computers (clients) over a network.

25
New cards

SSH (Secure Shell)

A secure and encrypted protocol for remote access.

26
New cards

Telnet

An older, unencrypted protocol for remote access.

27
New cards

Console Access

Direct physical connection to the device's console port for configuration and troubleshooting.

28
New cards

HTTPS (Web Interface)

Accessing the device's management interface through a web browser, often using HTTPS for secure communication.

29
New cards

Remote Desktop Protocol

A protocol for connecting to a remote computer's desktop, allowing for graphical control.

30
New cards

Firewalls

A network security device that monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies.

31
New cards

Attack Vector

A path by which a threat actor can gain access to a server, host, or network.

32
New cards

Adaptive Security Appliance (ASA)

Provides stateful firewall features and establishes secure Virtual Private Network (VPN) tunnels to various destinations.

33
New cards

Data Center Networks

Emphasize physical security and use VPNs with ASA devices.

34
New cards

Data Campus Area Networks

Secured using VPNs, ASA firewalls, IPS, Layer 3 and Layer 2 switches, ESA/WSA, AAA servers, and host security measures.

35
New cards

Small Office and Home Office Networks

Secured with consumer-grade wireless routers, Layer 2 switches, WPA2 encryption, and host-based antivirus/antimalware.

36
New cards

Virtualization

Foundation of cloud computing, separating the application from hardware and the operating system from the hardware.

37
New cards

Hyperjacking

An attacker hijacks a VM hypervisor (VM controlling software) and then use it as a launch point to attack other devices on the data center network.

38
New cards

Instant On Activation

When a VM that has not been used for a period of time is brought online, it may have outdated security policies that deviate from the baseline security and can introduce security vulnerabilities.

39
New cards

Antivirus Storms

Happens when all VMs attempt to download antivirus data files at the same time.

40
New cards

Borderless Network (Cisco)

Accommodate Bring Your Own Device (BYOD) trends, allowing users to access resources from various locations and devices using various connectivity methods.

41
New cards

Mobile Device Management (MDM)

Features provide data encryption, PIN enforcement, data wipe, DLP, and jailbreak/root detection.

42
New cards

Data Encryption (MDM)

Ensures that only devices that support data encryption and have it enabled can access the network and content.

43
New cards

PIN Enforcement (MDM)

The first and most effective step in preventing unauthorized access to a device.

44
New cards

Data Wipe (MDM)

Lost or stolen devices can be remotely fully-or partially-wiped, either by the user or by an administrator via the MDM.

45
New cards

Data Loss Prevention (DLP)

Prevents authorized users from doing careless or malicious things with critical data.

46
New cards

Jailbreak/Root Detection

MDM features can detect bypasses and immediately restrict a device’s access to the network or assets.

47
New cards

Hacker

Common term used to describe a threat actor.

48
New cards

Script Kiddies

Inexperienced individuals typically teenagers using automated tools to exploit vulnerabilities, to cause harm.

49
New cards

Vulnerability Brokers

Grey hat hackers reporting vulnerabilities for rewards.

50
New cards

Hacktivists

Hackers motivated by political or social agendas.

51
New cards

Cybercriminals

Black hat hackers driven by financial gain, often organized within criminal networks.

52
New cards

State-Sponsored

Organized groups acting on behalf of a government, focusing on espionage and sabotage.

53
New cards

Password Crackers

Tools used to recover passwords.

54
New cards

Wireless Hacking Tools

Tools that identify vulnerabilities in wireless networks.

55
New cards

Network Scanners

Tools used to probe network devices, servers, and hosts for open TCP or UDP ports.

56
New cards

Packet Crafting Tools

Tools used to probe and test a firewall’s robustness using specially crafted forged packets.

57
New cards

Packet Sniffers

Tools used to capture and analyze packets within traditional Ethernet LANs or WLANs.

58
New cards

Rootkit detectors

A directory and file integrity checker used by white hat hackers to detect installed root kits.

59
New cards

Fuzzers

Tools used by threat actors when attempting to discover a computer system’s security vulnerabilities.

60
New cards

Forensic Tools

Tools to sniff out any trace of evidence existing in a particular computer system.

61
New cards

Debuggers

Tools used by black hat hackers to reverse engineer binary files when writing exploits, also used by white hat hackers when analyzing malware.

62
New cards

Hacking operating systems

Designed operating systems preloaded with tools and technologies optimized for hacking.

63
New cards

Encryption tools

Tools that safeguard the contents of an organization’s data when it is stored or transmitted.

64
New cards

Cyber Threat Indicators

Features that identify malware files, IP addresses of servers that are used in attacks, filenames, and characteristic changes made to end system software

65
New cards

Indicators of attack (IOA)

Focus more on the motivation behind an attack and the potential means by which threat actors have, or will, compromise vulnerabilities to gain access to assets.

66
New cards

Vulnerability exploitation tools

Tools that identify whether a remote host is vulnerable to a security attack.

67
New cards

Vulnerability scanners

Tools that scan a network or system to identify open ports and scan for known vulnerabilities and scan VMs, BYOD devices, and client databases.

68
New cards

Eavesdropping attack

When a threat actor captures and listens to network traffic.

69
New cards

Data modification attack

Occur when a threat actor has captured enterprise traffic and has altered the data in the packets without the knowledge of the sender or receiver.

70
New cards

IP address spoofing attack

When a threat actor constructs an IP packet that appears to originate from a valid address inside the corporate intranet.

71
New cards

Password-based attacks

Occur when a threat actor obtains the credentials for a valid user account that let attackers list users, map networks, alter configurations, and manipulate data.

72
New cards

Denial-of-service (DoS) attack

Prevents normal use of a computer or network by valid users.

73
New cards

Man-in-the-middle attack (MiTM)

When threat actors have positioned themselves between a source and destination to actively monitor, capture, and control the communication transparently.

74
New cards

Compromised key attack

When a threat actor obtains a secret key, can be used to gain access to a secured communication.

75
New cards

Sniffer attack

An application or device that can read, monitor, and capture network data exchanges and read network packets.

76
New cards

Malware

Malicious software/code, is specifically designed to damage, disrupt, steal, or generally inflict some other “bad” or illegitimate action on data, hosts, or networks.

77
New cards

Viruses

Malicious codes that infect other programs and often require human intervention for propagation.

78
New cards

Trojans

Malicious software that masquerades as legitimate applications, performing harmful actions once executed.

79
New cards

Worms

Similar to viruses but can replicate themselves autonomously across networks.

80
New cards

Enabling vulnerability

A worm installs itself using an exploit mechanism, such as an email attachment, an executable file, or a Trojan horse, on a vulnerable system.

81
New cards

Propagation mechanism

After gaining access to a device, the worm replicates itself and locates new targets.

82
New cards

Payload

Any malicious code that results in some action.

83
New cards

Reconnaissance Attack

Unauthorized discovery and mapping of systems, services, or vulnerabilities.

84
New cards

Perform an information query of a target

The threat actor is looking for initial information about a target.

85
New cards

Initiate a ping sweep of the target network

The threat actor can now initiate a ping sweep to determine which IP addresses are active.

86
New cards

Initiate a port scan of active IP addresses

Used to determine which ports or services are available.

87
New cards

Run vulnerability scanners

To query the identified ports to determine the type and version of the application and operating system that is running on the host.

88
New cards

Access Attacks

Exploit known vulnerabilities in authentication services, FTP services, and web services.

89
New cards

Social Engineering Attacks

Attempts to manipulate individuals into performing actions or divulging confidential information

90
New cards

Pretexting

A threat actor pretends to need personal or financial data to confirm the identity of the recipient.

91
New cards

Phishing

A threat actor sends fraudulent email which is disguised as being from a legitimate, trusted source to trick the recipient into installing malware on their device, or to share personal or financial information.

92
New cards

Spear phishing

A threat actor creates a targeted phishing attack tailored for a specific individual or organization.

93
New cards

Spam

Also known as junk mail, this is unsolicited email which often contains harmful links, malware, or deceptive content.

94
New cards

Something for Something

A threat actor requests personal information from a party in exchange for something such as a gift.

95
New cards

Baiting

A threat actor leaves a malware-infected flash drive in a public location and finds a victim.

96
New cards

Impersonation

A threat actor pretends to be someone else.

97
New cards

Tailgating

A threat actor quickly follows an authorized person into a secure location to gain access to a secure area.

98
New cards

Shoulder surfing

A threat actor inconspicuously looks over someone’s shoulder to steal their passwords or other information.

99
New cards

Dumpster diving

A threat actor rummages through trash bins to discover confidential documents.

100
New cards

Run exploitation tools

The threat actor now attempts to discover vulnerable services that can be exploited.