Networks and Security Foundations D315 5.0 (1 review) Students also studied Terms in this set (124) Western Governors UniversityD 315 Save
WGU D315 - PRE-ASSESSMENT: NET...
205 terms Mira_PakPreview WGU C172 Network and Security - F...233 terms kamerasheree Preview Ultimate D278 Scripting and Progra...Teacher 114 terms Sara_HoeftPreview WGU D 70 terms drb Practice questions for this set Learn1 / 7Study using Learn Ping Sweep Attack, Ping Flood, Ping of death Mitigate by using a Packet Filtering Firewall NetworkA chain of communication that connects places. NOT THE INTERNET. Your home is its own ____ HubDumb, doesn't think, sits at physical layer of OSI model, Connects router to the network, sends data packets to ALL connected devices.Choose an answer 1Network2Physical address 3Access Point4 Network layer Security attacks and how to prevent them?Don't know?
SwitchUsed to connect devices in a specific networks, Builds a MAC address tables and sends accordingly. Is a more complex version of a Hub. Forwards data packets.Sits at Data Link Layer of the OSI model.Routeris a point of connection between two or more networks. Connects to other IP's.Forwards data packets between networks. Sits at network layer of the OSI model.Access PointUsed to interconnect wireless devices and provide a connection to the wired LAN. Different than wireless router. Sits at data link layer of OSI model.ProtocolSet of rules established for users to gain control of the network to exchange information.TopologyIs the network architecture used to interconnect the networking equipment.
- common network topologiesStar Network, Ring Network, and Bus network are common what?
Bus TopologyOld, used when the internet wasn't around, uses a cable/backbone/Datalink which is terminated on either end. Data packets travel with electric signals in 1 direction, called half duplex. Basically first come first serve, easy to setup, doesn't cost alot.Token Ring or Ring TopologyWas created to overcome 1st come first serve of bus topology. Uncommon, setup for specific reasons, each device passes a token at a certain time. Continuous path, loop, or ring.Star TopologyNot actually in a star, Could be cat cables to a patch panel in an office connected to a server room with a switch. All network devices are connected to hub or switch. The network devices do not share data connections to/from the hub or switch. A hub broadcasts all data traffic to all networking devices connected to its data ports. One downside is single point of failure if hub/switch breaks.Mesh topologyOvercomes star topology single point of failure. These are complicated and expensive. The world wide web or internet is an example of this. Has redundant data paths. All network devices are heavily interconnected. Can b e called Hub and Spoke.Physical addressAnother term for MAC address logical addressanother term for IP address Layers of OSI ModelLayer 1 - Physical Layer 2 - Data Link Layer 3 - Network Layer 4 - Transport Layer 5 - Session Layer 6 - Presentation Layer 7 - Application (All People Seem To Need Dominoes Pizza) Layers of the TCP/IP ModelApplication, transport,Network, and network interface
TCP/IP (Transmission Control Protocol/Internet Protocol) Model Used to connect network devices OSI ModelA Framework for networking that ensures compatibility in the network hardware and software. Helps with development of new networking technologies (All People Seem To Need Dominoes Pizza) HyperVisorSoftware that enables a single computer to run multiple operating systems simultaneously.Type 1 hypervisor/Bare Metal Hypervisoris loaded directly onto the hardware, and commonly used on server.Type 2 hypervisor/Hosted HypervisorLoaded on the operating system, and commonly used on personal computers.Typical Cloud Service modelsIaaS (infrastructure as a service) PaaS (Platform as a Service) SaaS (Software as a Service) IaaS (Infrastructure as a Service)A physical server without OS or anything on it. The renter chooses and setups EVERYTHING. The renter is responsible for it all past just the server.PaaS (Platform as a Service)A service that focuses on application development on any desired platform. They take care of OS and Server. Renter is responsible for sending them their data and website to host on their application. A testing location for a mobile app, (Its like you're renting a house and need to furnish it but the landlord is responsible for repairs) SaaS (Software as a Service)Application delivery. All the renter is involved with is making sure you can download the app.Public CloudCloud infrastructure is owned and operated by cloud service company but made available for general public use. (NOT FREE, think purchasing amazon AWS. You may still have to pay fee to access) Private CloudOperated by the organization and made available only to members of the organization. (DoD cloud example) Community CloudTwo or more organizations that have access to infrastructure.Hybrid CloudA combination of a private and public, has at least one private and one public cloud BYOD (bring your own device) policya statement concerning employees' permissions and responsibilities when they use their own device for organizational business. (actually taking your device to work and using work stuff on them) Saves money but risk of attacks Mobile Device Management (MDM)remotely controls smart phones and tablets, ensuring data security. (Mainly for BYOD)
Advance Persistent Threat (APT)A threat lies dormant waiting to trigger at a preordained time. utilized in ransomware attacks so that back ups are affected too.Zero-DayAttack against a vulnerability that is unknown to the original developer or manufacturer or public. (IPS can be used to try to stop attacks by monitoring) Vulnerability TestersScans servers and network devices for known vulnerabilities. (Typically good guys but sometimes bad guys use the same thing) Blue, Red, White, and Purple TeamsRed team attempts to compromise security Blue team defends White team observers (Referees) Purple team involves continuous improvement (When blue an red team engage, debrief, and cross-train) white hat hackerswork at the request of the system owners to find system vulnerabilities and plug the holes. (Red team works for the company, This ethical hacker doesn't) black hat hackersbreak into other people's computer systems and may just look around or may steal and destroy information. (Bad guys) gray hat hackersA cross between black and white—they will often illegally break into systems merely to flaunt their expertise to the administrator of the system they penetrated or to attempt to sell their services in repairing security breaches.Insider ThreatA threat to an organization that comes from employees, contractors, and anyone else that may have willingly been given insider knowledge. (MOST DANGEROUS KIND OF ATTACK) (Not always maliscious - could be accidental) (Principle of least privilege solves this) industrial espionageThe process of gathering corporate information illegally or unethically. theft of intellectual property from another company.nation-state espionagegovernments or countries trying to gain access to confidential information from other governments or countries, such as nuclear secrets or military maneuvers.Script KiddiesIndividuals who want to break into computers to create damage, yet lack the advanced knowledge of computers and networks needed to do so. Have no formal training. Used tools made by more advanced hackers.Wiretapping attackAny process that allows an attacker to electronically eavesdrop on a conversation, use of a packet sniffer on the network.port scanning attackChecks ports by sending thousands of TCP/IP packets to the victims computer.Each packet on a different port, used to determine which applications or services are used by which ports respond.