Home
Browse
Create
Search
Log in
Sign up
Upgrade to remove ads
Only $2.99/month
ITP 125 Midterm Review
STUDY
Flashcards
Learn
Write
Spell
Test
PLAY
Match
Gravity
Terms in this set (117)
Security
Freedom from care or doubt
Something that secures/makes safe
Precautions against attack
Information Security
Protection of data, as well as as hardware and networks
What can make you a target
employer
credit
credit card
location
CIA Triangle
Confidentiality
Integrity
Availability
Confidentiality
Need privileges to access information
Integrity
State of being uncorrupted
Prevention and detection
Availability
User can actually access information
Threat
Potential violation of security
Attack
Taking advantage of threats
Goals of Security
Prevention
Detection
Recovery
3 Types of Vulnerabilities
Technical
Human
Operations
Technical Vulnerability
not updating software
Human Vulnerability
Social engineering
Operations Vulnerability
Enforcing policy
Steps in Malicious hacking procedure
Recon
Scan for more info
Gain Access
Maintain Access
Cover Tracks
Code of Fair Information Practices
Use correct private information
Secure any personal information used
California Security Breach Act
Must notify individuals if their information has been compromised
early Windows OS
started with no inherent security (Usability > security)
Windows XP SP0
Had first firewall but it was disabled and hard to find
Windows XP SP2
enabled firewall by default and made it obvious to user
Windows Vista
Awful and everyone hated it
consistently asked whether user wanted to go through with actions
Security > usability
Windows 7 OS
Solved many problems from Vista and was a much better balance between usability and security
Linux OS
open source operating system
POST
Power on Self Test
- Starts every time computer is turned on
- Verifies identity of BIOS, system memory and size, and CPU
- Provides UI
BIOS
Basic Input Output System
- Firmware used by booting process
- Stored on motherboard of PCs only
- Loads OS
UEFI
Unified Extensible Firmware Interface
- Defines software interface between firmware and OS
- Replaces BIOS and used in Macs
- Can boot from disks > 2TB
- CPU independent Driver
- Supports network capabilities in pre boot
Motherboard
Main circuitboard
allows communication between CPU, memory, and connects peripherals
CPU
Carries out computer instructions by doing arithmetic, logical control, etc
microprocessors
RAM
Random Access Memory
- Fast Temporary storage
Hard Drive
rotating disks for long term storage
SSD
Solid State Drive
better for long term storage but more expensive
Purpose of Operating System
Software that manipulates hardware so that the user does not have to.
- Memory
- File Management
- Network
- Established API
API
Appliation Programming Interface
- Set of libraries for writing apps
- programs written for common platform not one computer
Program/Application
set of executable code
Process
Single Instance Computer program
Thread
smallest unit of processing that can be scheduled
How does Data move through storage locations?
Hard drive -> RAM managed by kernel
info is returned to RAM and when shut off, returned to hard drive
Paging/Virtual Memory
Allows data to be swapped out to the hard disk when RAM is full
Interrupts
Signal events that need immediate attention
(ex. ESC key etc)
File System
Data/File management
Command Line
Lighter interfaces which can be used with networks
Change users, folders, network connectivity, passwords etc
Faster than GUI
Least Access Principle
Need to know basis for information
Layered Security
Multiple Safeguards
Diversity of defense
using different vendors for each firewall
Different tactics
Security through Obscurity
Don't put launch codes in a file called "Launch Codes"
Keep it Simple
Occam's razor: simplest solution is best
Symmetric Encryption
Shared secret
Same key for encryption and decryption
DES, AES, Blowfish
Asymmetric Encryption
One key to encrypt and another to decrypt
RSA, public Key encryption
Public Key encryption
public key is available to everyone and is used to encrypt the message
Private Key encryption
private key is only known by recipient and is used to decrypt
Digital Signature
opposite of public key
use private key to encrypt to prove it's you
everyone can decrypt to prove it's you
3 methods of authentication
something you have (key)
something you know (password)
something you are (fingerprint scanner)
2 Factor Authentication
More than one thing needed for access
hash algorithm
runs data through a math formula to scramble it into unique data string
Used for passwords, ensuring data integrity
Brute Force
guaranteed to work
Slow
Dictionary
List of all possible words
Fast
must be exact match
Hybrid
Dictionary with small variations (H3ll0) vs (hello)
Can detect variation
slower
LM Hash Process
Runs through Data encryption standard and later advanced encryption standard
converted to 2-8 byte strings
combine to form 1-16 byte value
type password in - hash is compared to stored hash
LM Hash failure
DES easily hacked
password length/case sensitivity do not strenghthen password
easily prevented in windows 2000 by simply using a 15 character pw
ntlm hash Process
single step
MD4 encryption
NTLM strenghts
can have long passwords
case sensitive
no splitting the hash (short = easily cracked)
NTLM weaknesses
No salting (random data scattered throughout)
Vulnerable to rainbow tables
Windows Password Storage
SAM File of OS - not accessible when OS is running
SAM file Extraction
physical access to machine - boot into special environment (Boot CD/USB)
Network access- man in the middle
Linux hash/password Storage
MD5 encryption algorithm
stored in etc/shadow file
now uses salted hash
Mac Hash/password storage
individual file stored in a file labeled with GUID (globally unique identifier)
salted with 4 bytes of salt
Methods of password Protection
Complex PW
change often
auto logout
protected PW list (SAM file)
Different network topologies
Bus
Ring
Star
Mesh
Bus topology
all in a line
Pros: easy to install and cheap
Cons: collisions are unreliable and 1 failure shuts down whole system
Ring Topology
Every computer has 2 connections to form a circle
Cons: poor performance, not scalable, 1 failure shuts down whole system
Star Topology
- each node connected to central point
- most common (ethernet)
- non central failure won't tank everything
- lots of cabling and is not super expensive anymroe
Mesh Topology
Spider web shaped
pros: self healing, fast, no failure
Cons: no known route, hard to monitor traffic
CSMA/CD
Carrier sense Multiple Access with Collision Detection
Detects collisions before they occur, listens for clear wire before transmitting
If collision detected, send jam signal, stop transmission, wait random amount of time before trying again
OSI MODEL
7. Application
6. Presentation
5. Session
4. Transport
3. Network
2. Data Link
1. Physical
Theoretical Universal standard for network protocols
Application
any app that sends or stores data across a network
user interface level
http/ftp/DNS
Presentation
Formats data so the application layer can understand it
.jpg .docx .txt
Session
Starts and terminates network sessions
Connect-Authenticate- Disconnect
SSH, RPC
Transport
Establishes how hosts send data
Large data - packets
TCP/IP
Network
Logical Addressing
IP address
Data Link
Ever network has a unique Media Access Control (MAC) address
Prepares packet to be transmitted
Physical
Wire, fiber optic, wireless
MAC Address
media access control address
unique hardware address for network interface
IP address
Software address- unique within a network
Public IP address
purchased from ISP
private IP address
unique on an internal network but all have the same public IP
Network Address Translation(NAT)
allows all hosts on local area network (LAN) to share a public IP
routers connect IP to MAC using address reolution table (ARP) table
Dynamic IP Address
Addresses chane based on length of lease
Static IP address
manually assigned by system admin and can only be changed manually
gateway
single point in a network that connects public network
DNS
Domain Name Server
connects domain to IP address
TCP/IP
Transmission Control Protocol/Internet Protocol
Protocols for network communication. Functions at layer 4 (transport)
3 Way handshake
allows hosts to exchange starting sequence numbers and test the connection. SYN, SYN/ACK, ACK.
rainbow tables
data tables containing every single hash value for every possible password up to a certain # of characters
man-in-the-middle attack
if a system is authenticating to a network or accessing resources on another system, it will be passing hashes over the network to authenticate, MITM attacks attempt to sniff and gather these hashes in transit.
OSI model
7. Application 6. Presentation 5. Session 4. Transport 3. Network 2. Data Link 1. Physical
difference between static and dynamic ip addresses?
dynamic assigned via DHCP, change based on length of lease; static assigned manually , can only be changed manually.
PAR
Positive Acknowledgement and Retransmission; sends segment back to sender to acknowledge that it got packet.
sliding window
receiver can tell sender how much data can be sent at a time, how many packets can be sent before sending an ACK
TCP
Transmission Control Protocol - provides reliable, ordered, and error-checked delivery of a stream of packets on the internet. TCP is tightly linked with IP and usually seen as TCP/IP in writing. PO Box= computer and Zip Code=IP address example.
UDP
User Datagram Protocol. Used instead of TCP when guaranteed delivery of each packet is not necessary. UDP uses a best-effort delivery mechanism. Postcard example.
access point (AP)
computer or network device that serves a interface between devices and the network, connected to wired and wireless network and bridges the two
SSID
Service Set Identifier. Identifies the name of a wireless network. Disabling SSID broadcast can hide the network from casual users but an attacker can easily discover it with a wireless sniffer. It's recommended to change the SSID from the default name.
Hub
Broadcasts all network traffic to everyone connected to it, anyone can listen to anyone's conversation
Switch
Network traffic is directed to the host for whom it is intended, done through ARP table, no collisions
router
Network traffic managers that can be used to connect to different areas of the network, have more routing capabilities than a switch, usually allow for remote access for service/configuration
firewall
Security device that enforces a security policy for network traffic, via a set of rules defining what kinds of traffic are allowed and what kinds are not, effective and relatively inexpensive first line of defense, only as good as its configuration
IDS/IPS
Intrusion detection/prevention systems, network based hardware that monitors for malicious or suspicious network traffic
VPN
Virtual private network; allows people on the outside of a network to provide authentication so that they can be included in the network from a logical point of view
VoIP
Voice over Internet protocol; method for taking analog audio signals and translating them into digital data that can be transmitted over internet
3 types of clouds
Private, Hybrid, and Public
characteristic of each cloud
Private: infrastructure is available to only one organization, owned and operated by the organization. Public: Infrastructure is available to general public, available on subscription basis to anyone, owned and operated by 3rd party. Hybrid: combo of both, used only when security and compliance for part of the application is required and keeps costs low, owned by both organization and 3rd party.
SaaS
Software as a Service; software is owned and managed by provider, pay for use. Example: Netflix
PaaS
Platform as a Service; middleware', vendor provides and maintains foundation of technology, example: Google App Engine
IaaS
Infrastructure as a Service; 'hardware as a service', software and data managed by you, virtual hardware managed by you, example: Amazon Web Services
what is virtualization?
Allows for a single computer or server to do the job of multiple computers/servers, allows one computer to host multiple operating systems at the same time (ex. VirtualBox)
Why use virtualization?
Many different systems are put together into larger resources then parceled out into virtual guest computers, instead of having powerful workstation with each user why not centrally control the workstation?, allows multiple environments on one hardware platform
3 types of virtualization and examples
Server (VMware vSphere), Client (VMware View), Personal (VMware Fusion)
YOU MIGHT ALSO LIKE...
IT Audit: Auditing Operating Systems and Networks
55 terms
Virtualization and Networking
200 terms
MIS Chap 4-6
81 terms
ITEC 1001 Chapter 5
70 terms
OTHER SETS BY THIS CREATOR
ITP 475
29 terms
rhetorical terms week 1
10 terms
AP Lang vocab week 4
19 terms
AP English vocab (week 3)
20 terms