• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/15

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

15 Cards in this Set

  • Front
  • Back
Passive versus active
Listening vs. Transmit
Methodology of Attacks
"Path of Least Resistance" and use of an attack tree.
Target Acquisition: Attacks begin with:
Intelligence gathering; the homework before the attack
Controls implemented
- Limit information on a network
- Distract the attacker (honeypot)
Analyzing target for weaknesses
- tools available
- target analysis
Target Appropriation
- Elevation of the attacker's account.
- May attempt sustained control
Network Scanning
- Discovery Scanning
- Compliance Scanning
- Vulnerability Scanning
Data Link Layer
Point to point addressing and frames - includes ethernet, token ring, MAC and NICs
Physical
"Bit Mover" cabling etc...
Network
Logical or end to end address. Includes IP, Router, Routing and L3 Switch.
Transport Layer
End to end delivery. TCP and UDP. SSL, TLS.
Session Layer
Logical Connection
Presentation
Format of the data. ASCII, EBCIDIC, Compression and encryption
Presentation Layer
ENCRYPTION OCCURS
Application
SMTP, POP, IMAP, HTTP, HTTPS, FTP...The applications that do the work independent of the presentation of the "program" utilizing them.