CIA - ANSWER Confidentiality
Integrity
Authentication
DH (Diffie-Hellman) - ANSWER An asymmetric encryption algorithm used to create a
symmetric key pair.
DH group
(group 1 = 768 bits, group 2 = 1024 bits) - ANSWER Defines the length of the key
(modulus size) to use for the DH key exchange.
Asset - ANSWER An _____ is an item that is to be protected and can include
property, people, and information/data that have value to the company. This includes
intangible items such as proprietary information or trade secrets and the reputation
of the company. The data could include company records, client information,
proprietary software, and so on.
Vulnerability - ANSWER A __________ is an exploitable weakness of some type.
That exploitation might result from a malicious attack, or it might be accidentally
triggered because of a failure or weakness in the policy, implementation, or software
running on the network.
Threat - ANSWER This is what you are protecting against. A ______ is anything that
attempts to gain unauthorized access to, compromise, destroy, or damage an asset.
______ are often realized via an attack or exploit that takes advantage of an existing
vulnerability.
Today they come in many varieties and spread more rapidly than ever before. They
can also morph and be modified over time, and so you must be ever diligent to keep
up with them.
Risk - ANSWER ______ is the potential for unauthorized access to, compromise,
destruction, or damage to an asset. If a threat exists, but proper countermeasures
and protections are in place (it is your goal to provide this protection), the potential
for the threat to be successful is reduced.
Countermeasure - ANSWER A ______________ is a device or process (a
safeguard) that is implemented to counteract a potential threat, which thus reduces
risk.
, Covert channel - ANSWER This method uses programs or communications in
unintended ways. For example, if the security policy says that web traffic is allowed
but peer-to-peer messaging is not, users can attempt to tunnel their peer-to-peer
traffic inside of HTTP traffic. An attacker may use a similar technique to hide traffic
by tunneling it inside of some other allowed protocol to avoid detection. An example
of this is a backdoor application collecting keystroke information from the workstation
and then slowly sending it out disguised as Internet Control Message Protocol
(ICMP). This is a _____________.
Trust exploitation - ANSWER If the firewall has three interfaces, and the outside
interface allows all traffic to the demilitarized zone (DMZ) but not to the inside
network, and the DMZ allows access to the inside network from the DMZ, an
attacker could leverage that by gaining access to the DMZ and using that location to
launch his attacks from there to the inside network. Other trust models, if incorrectly
configured, may allow unintentional access to an attacker including active directory
and NFS (Network File System in UNIX).
Brute-force (password guessing) attacks
Password-guessing attacks can also be done through malware, man-in-the-middle
attacks using packet sniffers, or by using key loggers. - ANSWER ____________
types of attacks are performed when an attacker's system attempts thousands of
possible passwords looking for the right match. This is best protected against by
specifying limits on how many unsuccessful authentication attempts can occur within
a specified time frame.
Botnet - ANSWER A _______ is a collection of infected computers that are ready to
take instructions from the attacker. For example, if the attacker has the malicious
backdoor software installed on 10,000 computers, from his central location, he could
instruct those computers to all send TCP SYN requests or ICMP echo requests
repeatedly to the same destination. To add insult to injury, he could also spoof the
source IP address of the request so that reply traffic is sent to yet another victim. The
attacker generally uses a covert channel to manage the individual devices that make
up the _________.
DoS and DDoS
A more advanced and increasingly popular type of DDoS attack is called a reflected
DDoS (RDDoS) attack. An RDDoS takes place when the source of the initial (query)
packets is actually spoofed by the attacker. The response packets are then
"reflected" back from the unknowing participant to the victim of the attack; that is, the
original (spoofed) source of the initial (query) packets. - ANSWER An example of
_____ is using a botnet to attack a target system. If an attack is launched from a
single device with the intent to cause damage to an asset, the attack could be
considered a _______ attempt?
TACACS+ Functionality - ANSWER Separates AAA functions into distinct elements.
Authentication is separate from authorization, and both of those are separate from
accounting.
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller leonardmuriithi061. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $17.99. You're not tied to anything after your purchase.