Networking - Chapter 3

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

facial recognition

A biometric technology that looks for unique measurements in an individual's face.

access control list (ACL)

A clearly defined list of permissions attached to an object that specifies what actions an authenticated user may perform on a shared resource.

identity theft

A crime that involves thieves collecting enough data about a victim to pretend to be another person in order to steal money or obtain benefits

fingerprint recognition

A technique for authenticating computer users by scanning their fingerprints. Inexpensive but poor precision, deceivable. Sufficient only for low-risk issues.

Distributed Denial of Service (DDoS)

An attack that uses multiple zombie computers - bots - (even hundreds or thousands) in a botnet to flood a device with requests.

zero day attack

Attack between the time a software vulnerability is discovered and a patch to fix the problem is released.

Threat Environment

Attacks and attackers that companies face

digital certificate authentication

Authentication in which each party has a secret private key and a public key. the Sender encrypts the message using the Private key, the Receiver decrypts using Public key

List the criminal groups beside the attackers that were involved in the overall process

Crimeware shops, online card shops, counterfeiters

How do viruses and worms differ?

Viruses attach themselves to programs on your computer, whereas worms are their own program and they spread by themselves through vulnerabilities in other computers.

Antivirus programs check for:

Viruses, worms, trojan horses and other forms of malware

For what application is SSL/TLS mostly used

Web applications because SSL/TLS is built into every webserver and browser today, so protection can be added at a negligible cost

cryptographic system

a bundle of protections that work automatically, including initial authentication, message by message protection for authentication, integrity, and confidentiality

In digital certificate authentication, the verifier sends this to a supplicant claiming to be the true party:

a challenge message

vulnerability

a flaw in a program that permits a specific attack or set of attacks against this program to succeed

personal identification number (PIN)

a form of authentication whereby the user supplies a number (4-6 digits) that only he or she knows

malware

a general term for evil, malicious software, such as spyware, computer viruses, and worms

script

a group of commands written in a simplified programming language, usually JavaScript. Executes when a webpage loads or the user takes a particular action.

password dictionaries typically have three types of entries

a list of common passwords, the words in standard dictionaries, and hybrid versions of these words (with capitalization or special characters added)

SPI firewalls only make a decision whether or not to pass:

a packet for non-connection opening attempts. It does not have to make a decision about the entire connection as it does in connection opening attempts

firewall

a part of a computer system or network that is designed to block unauthorized access while permitting outward communication.

spear phishing

a phishing expedition in which the emails are carefully designed to target a particular person or organization

Firewalls pass all attack packets, even if they are suspicious, as long as they are not

a provable attack packet

Challenge message

a random bit string

exhaustive search

a search that continues until the test item is compared with all items in the memory set

How did attackers exfiltrate data from the Target network?

Data was collected at the POS terminal and sent to both the legitimate target servers, but also to a holding server for storing the data temporarily. The attackers then compromised another server that would deliver the data to the attackers outside of the Target network

Command control server

a server that in a distributed denial of services attack (DDos) is used to receive orders and sends the attack command to bots in a bot net. Makes the botmaster difficult to identify

patch

a small program designed to fix a security vulnerability

Advanced Persistent Threat (APT)

a sophisticated, possibly long-running computer hack that is perpetrated by large, well-funded organizations such as governments

certificate authority (CA)

a trusted organization that can vouch for the authenticity of the person or organization using authentication, distributes the public key of a person in a document

supplicant

a user that is trying to prove his or her identity in authentication

host to host virtual private network (VPN)

addresses a lack of security through communication with cryptographic protections

if a packet is not a provable attack packet, the firewall will

allow it to pass

Electronic signatures provide message integrity by:

allowing the receiver to detect if the packet is altered by an attacker while the packet is in transit

Behavioral patterns

an analysis of what the program is attempting to do (e.g. reformat the hard drive - an undeniable indication of malware)

Explain "advanced" in advanced persistent threats (APT)

attackers use extremely advanced techniques that often begin with a highly targeted spear phishing attack

Explain "persistence" in the context of advanced persistent threats (APT)

attacks are usually long term that can last weeks, months and even years

The issue for hacking is

authorization (which goes beyond finding a user name and password left somewhere negligently. this is not authorization)

why is facial recognition controversial

because it can be done surreptitiously (without the supplicant's knowledge) and that raises privacy issues

why do users not have to worry about the details of cryptographic processes when they are using a VPN

because the VPNs always use a cryptographic system, which is a bundle of protections that work automatically

iris recognition

biometric system; compares iris color patterns to database. expensive but precise and difficult to deceive

What is the person who controls a collection of compromised computers called?

bot master

What is a collection of compromised computers called?

botnet

Which programs directly attack the victim in a distributed denial of service (DDoS) attack?

bots

complex passwords can only be cracked by a

brute force attack

What type of adversary are most hackers today?

career criminals that hack for money

what type of organization will provide a verifier with the true party's digital certificate

certificate authority (CA)

spyware trojans

collect sensitive data and send the data to an attacker

botnet

collection of captured bot computers used in a distributed denial of service (DDoS) attack

To what computer does an attacker (bot master) send messages?

command control server

Good passwords have two characteristics

complex (have a mix of upper and lower case letters, no regular pattern, include non-letter characters), and long (between 8-12 characters)

propagation vectors

computer-to-computer transmission methods

SSL/TLS

cryptographic protocols that provide communications security over a computer network

provable attack packet

data identified as malicious by firewall -- and then discarded

Application awareness

deep inspection gives next generation firewalls the ability to identify the type of application that created a particular stream of messages and permits the firewall to execute pass/drop rules based on application policies

Functionality found in Next Generational Firewalls (NGFW)

deep inspection, application awareness, intrusion detection system functionality, intrusion prevention functionality, reputation management, NAT and VPN traversal and wire speed operation

An electronic signature allows the receiver to:

detect a message added to the dialogue by an imposter

contains the public key and other identification information of a user.

digital certificate

what electronic document contains the true party's public key?

digital certificate

strongest method of authentication

digital certificate authentication

if a packet is a provable attack packet, the firewall will

discard it

Advanced Encryption Standard (AES)

dominant symmetric key encryption cipher in use today

Reputation Management

External services that compile lists of websites and other resources with very good reputations (white lists) and very bad reputations (blacklists). These lists can be used to inform decisions about packets to and from these sites

Typical propagation vectors (worms)

email attachments, visits to websites (even legitimate ones), social networking sites, many others (USB RAM sticks, peer to peer filing sharing, etc.). These require human gullibility, which is widespread but slow

Next-Generation Firewalls

Firewalls that use deep inspection, examines all fields in the internet and transport layer, examines transport layer content (including reassembling application messages from multiple segments)

Which employees are the most dangerous if they become an attacker/hacker?

IT and security employees because they already have access, know the systems, know how to avoid detection, and are trusted by the organization

Encryption for confidentiality

encrypting messages so that if an eavesdropper intercepts a message, he or she will not be able to read it. The sender uses a cipher to create the message and the receiver decrypts the message in order to read it

What three protections does cryptographic systems provide to every packet?

encryption for confidentiality provides message by message confidentiality, electronic signatures provide message by message authentication and message integrity

In digital certificate authentication, what does the supplicant do?

encrypts the challenge message using their private key and sends the response message to the verifier

default rule (in an access control list)

ensures that unless a packet is explicitly allowed by an earlier rule, it is dropped and logged

approved connections table

In SPI, a connection is added to this if it is permitted by SPI. Each connection has a row containing the IP address and port number of the internal host (internal socket) and the IP address and port number of the external host (external socket) for each connection

career criminal hackers

In security, an attacker who is primarily interested in making money from security breaches.

Hacking

Intentionally accesses a computer without authorization or exceeds authorized access. I

Intrusion Prevention System (IPS)

Intrusion detection systems (IDSs) that drop packets that are suspicious but for which there is a confidence that they are attacks

How does a trojan horse differ from viruses, worms, and mobile code?

It cannot spread from one computer to another by itself. It must be placed there by another piece of malware, by a human attacker, or by downloading the program voluntarily

Stateful packet inspections (SPI) firewalls are inexpensive overall because:

It focuses on packets that are attempting to open a connection (<= 1% of packets) and uses less processing power for packets that are not attempting to open a connection (>= 99%) of all packets

In SPI, if a packet is not attempting to open a connection and it is not part of an approved connection

It must be spurious, and it is dropped and logged

What are the most frequent types of attacks on companies?

Malware attacks

downloaders

Malware that downloads and installs another program on the computer

Why is signature detection not sufficient for an antivirus program?

Many malware programs mutate, changing their signatures. Also, there are now too many malware programs to test for all malware signatures

What two protections do electronic signatures provide?

Message by message authentication and message integrity

What resources can hackers purchase and sell over the internet?

exploit programs with slick interfaces and prepaid annual updates, credit card information and identity information

Deep inspection

Next generation firewalls most fundamental function. Looks at everything in the packet, including the application message segment and all fields in the IP header and the TCP or UDP header. Also reassembles packet streams to read application messages

ingress filtering

filtering packets arriving at a network from the outside

Stateful Packet Inspection (SPI)

firewall filtering mechanism that treats different types of packets differently, spending more resources on the riskiest packets and less on the least risky

what is VPN traversal?

firewalls allow VPN traffic to traverse them without filtering (tradeoff between encryption security and filtering security)

Is it generally illegal to write malware in the United States?

No, it not illegal to write malware but it is illegal to release the malware to do damage or to sell the malware to be used in that way

Does a firewall drop a packet if it probably is an attack packet?

No. It only drops provable attack packets

Are Bots limited to DDoS attacks?

No. They are general-purpose exploitation programs the botmaster can remotely update with new capabilities after installation

Are scripts normally bad?

No. scripts are normally benign but may be damaging if the browser has a vulnerability

Does all malware have a payload?

No; however, even malware without payloads can do damage such as cause a computer to run slowly or crash

Cons of reusable passwords

Often weak (easy to crack)

public key

One of the keys used in asymmetric encryption systems. It is widely distributed and available to everyone.

What gives bots flexibility?

Payloads allow bots to be upgraded remotely by hackers enhancing its capabilities

payloads

Pieces of code that do damage

Cyberwar/cyberterrorism

Politically motivated attacks designed to compromise the electronic infrastructure of an enemy nation and disrupt its economy.

Trojan HOrses

Programs that come into a computer system disguised as something else

Why may employees, ex-employees, and other insiders become attackers?

Revenge or theft

The most common cryptographic system for browser-webserver VPNs is:

SSL/TLS (Secure Socket Layer and Transport Layer Security)

SSL/TLS is an attractive cryptographic system for webservers because:

SSL/TLS is built into every webserver and browser today, so the cost of adding SSL/TLS protection is negligible

Mobile code on webpages

Scripts. HTML webpages can contain scripts called mobile code because they are downloaded with the webpage

How does security thinking differ from network thinking?

Security thinking anticipates the actions of intelligent adversaries who will try to many things to succeed and adapt to the defenses you put in place. Network thinking focuses on adequate planning, software bugs, and mechanical breakdowns.

Symmetric Key Encryption

Sender and receiver use single, shared key

In digital certificate authentication, what does the verifier do?

Sends a supplicant a challenge message, receives the response message (the challenge message encrypted with the supplicant's private key), obtains the true party's public key, decrypts the response message using the true party's public key to see if the response produces the original challenge message

Wire-speed operations

firewalls can receive and process traffic at the full speed of the lines coming into them. they do this by relying on application specific integrated circuits that can process NGFW more quickly

Most Denial of Service (DoS) attacks involve

flooding victim computers with attack packets - a distributed DoS attack

Intrusion Detection System (IDS)

focus specifically on identifying suspicious transmissions and log them for firewall administrators to examine. If the threat appears to be very serious, the IDS sends an alarm to firewall administrators. Can also produce false alarms that can dull vigilance

old school hackers

hackers driven by curiosity, a desire for power, and peer reputation

Dictionary attacks

hackers run through the password dictionary to see if a password is accepted for a username to break into a host

Social Engineering

hackers use their social skills to trick people into revealing access credentials or other valuable information (such as open email attachments or visit websites)

To prove its claim to being the true party, the supplicant encrypts the challenge message using

his or her private key

What protection does confidentiality provide?

if an eavesdropper intercepts a message, he or she will not be able to read it

true party

in digital certificate authentication, the supplicant first claims to be the true party

why are passwords widely used

inexpensive because they are built into operating systems and they are easy to use (users are familiar with them)

In SPI, if a packet is part of an established connection (in the access connections table)

it is passed without further inspection

directly propagating worm

jumps to victim hosts directly, no action is required on the part of the victim, target hosts must have a specific vulnerability for this to succeed. Can spread with amazing speed.

Limitations to stateful packet inspection (SPI) firewalls

limited to primarily examining socket date (IP address and port number), cannot detect what applications are actually using port 80, and cannot identify problems in streams of packets

password dictionaries

lists of passwords likely to succeed for a hacker to access a host

keys

long strings of bits

what types of passwords can only be broken into by brute force attacks

long, complex passwords

virus

malware that attaches itself to another program

worms

malware that is a stand-alone program that doesn't need to attach itself to another program

Cyberwar is conducted by

national governments

Can a password that can be broken into by a dictionary attack be adequately strong if it is very long

no password that is in a cracker dictionary is adequately strong, no matter how long it is

passwords are only useful for

nonsensitive assets

What kind of TCP packets attempt to open a connection

only packets with SYN segments

States for stateful packet inspection firewall filtering

opening a connection and ongoing communication

vendors release this to close vulnerabilities

patch

weakness of long and complex passwords

people often write them down

access cards

permit door access, can be used for computer access

egress filtering is done to:

prevent sensitive corporate information from being transmitted outside the firm

credentials

proof of identity

Authentication

proving a sender's identity

digital certificate

public key of a person in a document, distributed by a certificate authority (CA)

application specific integrated circuits

purpose-built computer chips that can process NGFW functions far more quickly than traditional firewalls

The challenge of creating next generation firewalls

require extremely large amount of processing power, but at the same time they must delay traffic

two factor authenticiation

requires two credentials for authentication. increases the strength of authentication

The most common authentication credential

reusable password

The weakest form of authentication

reusable password

proximity access cards

same as access cards, but don't need to swipe to gain access

Antivirus programs use what to detect malware?

signature detection and behavioral detection

what types of passwords are susceptible to dictionary attacks

simple passwords - common passwords, words in standard dictionaries, and hybrids of these things

Electronic signatures

small bit strings that provide message-by-message authentication

distinguish between social engineering in general and phishing

social engineering attacks generally try to trick the victim into doing something against personal or organization interests, phishing uses authentic looking emails and sites to do this

Most firewalls today use this firewall filtering mechanism

stateful packet inspection (SPI)

reusable password

string of characters user types to gain access to resources associated with a user name. Can be used repeatedly so it is reusable. It is also the weakest form of authentication, so it is appropriate only for the least sensitive assets

why must authentication be appropriate for risks to be an asset

strong authentication is expensive and often inconvenient so it is most appropriate for strong authentication to be used for very sensitive information. For relatively non-sensitive data, weaker but less expensive authentication methods may be sufficient

Cyberterror attacks are conducted by

terrorists

Stateful packet inspection (SPI) states and filtering intensity

the SPI firewall filtering focuses resources on the connection opening attempt (the riskiest state) and less on the ongoing communication (which is less risky)

firewall log file

the firewall copies information about each discarded packet in order to understand the types of attacks coming against the resources that the firewall is protecting

cipher

the generic term for a technique (or algorithm) that performs encryption

Denial of service (DoS) attacks

the goal is to make a computer or entire network unavailable to its legitimate users

firewall filtering mechanisms

the methods used by firewalls to examine packets to see if they are attack packets

SPI firewalls focus on which state?

the most risky - the opening state (versus the ongoing state)

verifier

the party requiring a supplicant to prove his or her identity in authentication

brute force attack

the password cracker tries every possible combination of characters

In digital certificate authentication, does the verifier decrypt with the true party's public key or the supplicant's public key?

the true party's private key

biometics

the use of body measurements to authenticate you

cryptography

the use of mathematical operations to protect messages traveling between parties or stored on a computer

after propagation, viruses and worms execute:

their payloads. Payloads are malicious code that does damage such as erase hard disks or send users to porn sites when they mistype urls

Both firewalls and antivirus programs attempt to stop attacks, but:

they work at different levels. Firewalls work at the level of packets and groups of packets. Antivirus programs examine entire files.

What is the purpose of a denial of service (DoS) attack?

to make a computer or entire network unavailable to its legitimate users

exploit

to take advantage of; the act of breaking into a computer; the piece of software or procedure (or a combination) that is used to take over the host by sending exploit packets

why is it important to read firewall logs daily

to understand the types of attacks coming against the resources that firewalls are protecting

NAT and VPN traversal

traditional firewall functionality. VPN traversal passes encrypted traffic without inspection.

phishing attacks

type of social engineering attack that uses legitimate-looking e-mails or Web sites created in an attempt to obtain confidential data about a person

spam

unsolicited commercial email

Virtual Private Network (VPN)

uses the internet to create the appearance of private, secure connections

The earliest pieces of malware were?

viruses and worms

What is the name given to a vulnerability specific attack that occurs before a patch is available?

zero-day attack

Why are scripts call mobile code?

Because they travel with the downloaded webpage from the webserver to the browser

How did attackers gain access to Target's network?

Stole credentials from a Target vendor, likely from a spear fishing email to a vendor employee that tricked him or her into loading malware onto his or her machine. The attacker used the credentials to get access to the vendor servicer and used this to move more deeply into the Target network.

AES supports multiple strong key lengths up to:

256 bits

Why are cyberwar and cyberterror attacks especially dangerous?

3 reasons. (1)funding allows them to be extremely sophisticated; (2) they focus on doing damage instead of committing thefts; (3) they are likely to be directed against many targets simultaneously for massive damage

Hacking attacks typically take place in two stages:

(1) The exploit (code, software, procedure or a combination that an attacker uses to take over the host by sending exploit packets. also means the act of breaking into a computer) and (2) after the break in (manually exploits the resource or leaves a trojan horse behind for continuous automated exploitation)

surreptitious

(adj.) stealthy, secret, intended to escape observation; made or accomplished by fraud

In two-way dialogues using symmetric key encryption, how many keys are used for encryption and decryption?

1

Benefits of reusable passwords

1. Ease of use for users (familiar) 2. Inexpensive because they are built into operating systems.

Steps for digital certificate authentication

1. the supplicant claims to be the true party. 2. the verifier tests the claim by sending the supplicant a challenge message. 3. the supplicant encrypts the challenge message using his or her private key and sends the response message to the verifier. 4. the verifier gets the supplicant's digital certificate containing the true party's public key) 5. the verifier decrypts the message using the true party's public key. if the message contains the original challenge message, the supplicant is verified as the true party. NOTE: the verifier uses the public key of the true party, not the supplicant's public key

To be considered strong, keys have to be at least how long?

100 bits

Anti-virus signature detection

AV programs look for malware signatures - snippets of code that indicate specific malware programs

What were the steps take by the attackers in the Target breach?

Stole credentials from a Target vendor, likely from a spear fishing email to a vendor employee that tricked him or her into loading malware onto his or her machine. The attacker used the credentials to get access to the vendor servicer and used this to move more deeply into the Target network. The attacker uploaded POS malware purchased from an online crimeware shop to a malware download shop within Target. The malware was downloaded to POS systems and the malware collected magnetic stripe data from card swipes and sent it to the attackers as well as to the legitimate Target server. The attackers then sold the stolen data to counterfeiters.

egress filtering

The practice of monitoring and potentially restricting the flow of information outbound from one network to another

private key

The secret portion of an asymmetric key pair typically used to decrypt or digitally sign data. The private key is never shared and is always used for decryption, with one notable exception: The private key is used to encrypt the digital signature.

response message (in digital certificate authentication)

The supplicant encrypts the challenge message with his or her private key and sends itto the verifier

List the internal Target servers the attackers compromised

The vendor server, the malware download server (the internal target server that downloaded updates to POS systems), the holding server (server where data from POS terminals was stored temporarily); the Extrusion server (another servers that was used to deliver the data to attackers outside the Target network)

What is a problem with stateful packet inspection (SPI) firewalls?

They only look at IP addresses and port numbers in their rules. They do not look at everything in the packet, including at the application messages that are delivered

Why is two-factor authentication desirable?

Two factor authentication increases the strength of authentication. You will need two authentication rather than one

What is the biggest challenge with patches?

Users do not always install patches promptly or at all so they continue to be vulnerabilty

credit card number theft

Uses stolen credit card numbers in unauthorized transactions


Ensembles d'études connexes

death dying and afterlife exam 3

View Set

Integers with variables by Mr. Turner

View Set

Module 5 - Recruitment & Retention

View Set

Chapter 25: Assessing Neurologic System

View Set

Chapter 5 & 6: Morphology & Word Formation

View Set

Missed final insurance questions

View Set

Biochemistry Final Review Questions

View Set

Psychology Vocab for the Year- People

View Set

FINA 3313 Chapter 9 Quizzes (Capital Budgeting Techniques)

View Set