CompTIA Net+ Chapter 9 - Explaining Network Security Concepts

0.0(0)
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/55

flashcard set

Earn XP

Description and Tags

CompTIA Net+ Chapter 9

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

56 Terms

1
New cards

CIA Trad

  • Confidentiality

  • Integrity

  • Availability

2
New cards

Confidentiality

Means that certain information should only be known to certain people.

3
New cards

Integrity

Means that the data is stored and transferred as intended and that any modification is authorized.

4
New cards

Availability

Means that information is accessible to those authorized to view or modify it.

5
New cards

Vulnerability

A weakness that could be accidently triggered or intentionally exploited to cause a security breach

6
New cards

Threat

The potential for someone or something to exploit a vulnerability and breach security.

7
New cards

Risk

The likelihood and impact of a threat actor exercising a vulnerability.

8
New cards

Risk Management

Process for identifying, assessing, and mitigating vulnerabilities and threats to the essential function that a business must perform to serve its customers.

9
New cards

Risk Assessment

A subset of risk management where the company’s systems and procedures are audited for risk factors.

10
New cards

Business Impact Analysis

Process of assessing what losses might occur for a range of threat scenarios.

11
New cards

Regulatory Compliance

Imposes externally determined requirements on companies in certain industries or when processing certain types of data.

12
New cards

Personally Identifiable Information (PII)

Data that can be used to identify, contact, locate, or describe an individual

13
New cards

General Data Protection Regulation (GDPR)

Europe’s privacy legislation

14
New cards

Data Sovereignty

Refers to a jurisdiction preventing or restricting processing and storage from taking place on systems that do not physically reside within that jurisdiction.

15
New cards

There are two main types of cryptographic cipher or algorithm:

  • Encryption Algorithm

  • Cryptographic Hash Algorithm

16
New cards

Encryption Algorithm

  • Converts a human-readable plaintext into a ciphertext.

  • A ciphertext must be decrypted using a key linked to the initial encryption process before it can be read.

  • This makes data confidential, so long as the key is only available to authorized persons.

17
New cards

Cryptographic Hash Algorithm

  • Converts a variable length string into a fixed-length hash.

  • This hash cannot be converted back to a plaintext.

  • This can prove the integrity of data (verifying that it has not been modified). It is also used for password storage and in other authentication solutions.

18
New cards

Data can be described as being in one of three states:

  • Data at Rest

  • Data in Transit (or data in motion)

  • Data in Use (or data in processing)

19
New cards

Data at Rest

The state in which data is in some sort of persistent storage media.

20
New cards

Data in Transit

The state in which data is transmitted over a network

21
New cards

Data in Use

The state in which data is present in volatile memory, such as system RAM or CPU registers and cache.

22
New cards

Exploit

Specific code or method of using a vulnerability to gain control of a system or damage it in some way.

23
New cards

Zero-Day Vulnerabilitiy

A vulnerability that is exploited before the developer knows about it or can release a patch

24
New cards

Vulnerability Assessment

Evaluation of a system’s security and ability to meet compliance requirements based on the configuration state of the system.

25
New cards

Honeypot

A decoy computer system designed to attract attackers.

26
New cards

The outputs from the primary research undertaken by security solutions providers and academics can take three main forms:

  • Behavioral Threat Research

  • Reputational Threat Intelligence

  • Threat Data

27
New cards

Behavioral Threat Research

Narrative commentary describing examples of attacks and TTPs gathered through primary research sources.

28
New cards

Reputational Threat Intelligence

Lists of IP addresses and domains associated with malicious behavior, plus signatures of known file-based malware.

29
New cards

Threat Data

Computer data that can correlate events observed on a customer's own networks and logs with known TTP and threat actor indicators.

30
New cards

Enumeration

Information gathering attacks

31
New cards

Footprinting

Allows a threat actor to discover he topology and general configuration of the network and security systems.

32
New cards

Fingerprinting

Allows a threat actor to identify device and OS types/versions.

33
New cards

Spoofing

Include any type of attack where the threat actor disguises their identity, or in which the source of network information is forged to appear legitimate.

34
New cards

Denial of Service (DoS)

Causes a service at a given host to fail or to become unavailable to legit users.

35
New cards

Distributed DoS (DDoS)

Attack that is launched simultaneously by multiple hosts.

36
New cards

Botnet

Group of compromised hosts that can be used to launch DDoS and DRDoS attacks.

37
New cards

Malware

Software that does something bad

38
New cards

The following categories describe some types of malware according to vector:

  • Viruses and worms

  • Trojan

  • PUPs/PUAs

39
New cards

Viruses and Worms

These represent some of the first types of malware and spread without any authorization from the user by being concealed within the executable code of another process. Viruses infect files, while worms can infect processes running in system memory.

40
New cards

Trojan

Malware concealed within an installer package for software that appears to be legitimate. This type of malware does not seek any type of consent for installation and is actively designed to operate secretly.

41
New cards

PUPs/PUAs

Software installed alongside a package selected by the user or perhaps bundled with a new computer system. Unlike a Trojan, the presence of a PUP is not automatically regarded as malicious. It may have been installed without active consent or consent from a purposefully confusing license agreement. This type of software is sometimes described as grayware rather than malware.

42
New cards

On-Path Attack

Specific type of spoofing attack where a threat actor compromises the connection between two hosts and transparently intercepts and relays all communications between them.

43
New cards

ARP Spoofing

Works by broadcasting unsolicited ARP reply packets, with the source address that spoofs a legitimate host or router interface.

44
New cards

MAC Flooding

  • Used to attack the switch

  • Intention is that the attacker is to exhaust the memory used to store the switch’s MAC address table

  • Overwhelming the table can cause the switch to stop trying to apply MAC-based forwarding and flood unicast traffic out of all ports, working as a hub.

45
New cards

VLAN Hopping

  • Designed to send traffic to a VLAN other than the one the host system is in.

  • This exploits the default VLAN feature of 802.1Q

  • Uses a device placed in the default LAN

  • Crafts a frame with two VLAN tag headers

  • The first trunk switch to inspect the frame strips the first header, and the frame gets forwarded to the target VLAN.

46
New cards

Rogue Device

A device or service on your network that isn’t under administrative control

47
New cards

DNS Attacks

Exploits vulnerabilities in the DNS to disrupt internet traffic, redirect users to malicious sites, or steal data, often involving techniques like hijacking, poisoning, or DDoS attacks.

48
New cards

DNS Server Cache Poisoning

Aims to corrupt the records held by the DNS server itself

49
New cards

Phishing Attacks

  • Combination of social engineering and spoofing

  • Persuades or tricks the target into interacting with a malicious resource disguised as a trusted one, traditionally using email as the vector

50
New cards

Should Surfing Attack

Where a threat actor can learn important information by watching the user type it

51
New cards

Tailgating

Is a means of entering a secure area without authorization by following closely behind the person that has been allowed to open the door or checkpoint.

52
New cards

Piggybacking

Where an attacker enters a secure area with an employee’s permission

53
New cards

Dumpster Diving Attack

Refers to combing through an organization’s (or individual’s) garbage to try to find useful documents

54
New cards

Password cracking software uses various methods to work out the plaintext password string from a cryptographic hash:

  • Dictionary

  • Brute Force

55
New cards

Dictionary

  • The software matches the hash to those produced by ordinary words found in a dictionary.

  • This could also include information such as user and company names, pet names, or any other data that people might naively use as passwords.

56
New cards

Brute Force

  • The software tries to match the hash against one of every possible combination it could be. If the password is short (under eight characters) and non-complex (using only letters, for instance), a password might be cracked in minutes.

  • Longer and more complex passwords increase the amount of time the attack takes to run.