Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
15 Cards in this Set
- Front
- Back
Passive versus active
|
Listening vs. Transmit
|
|
Methodology of Attacks
|
"Path of Least Resistance" and use of an attack tree.
|
|
Target Acquisition: Attacks begin with:
|
Intelligence gathering; the homework before the attack
|
|
Controls implemented
|
- Limit information on a network
- Distract the attacker (honeypot) |
|
Analyzing target for weaknesses
|
- tools available
- target analysis |
|
Target Appropriation
|
- Elevation of the attacker's account.
- May attempt sustained control |
|
Network Scanning
|
- Discovery Scanning
- Compliance Scanning - Vulnerability Scanning |
|
Data Link Layer
|
Point to point addressing and frames - includes ethernet, token ring, MAC and NICs
|
|
Physical
|
"Bit Mover" cabling etc...
|
|
Network
|
Logical or end to end address. Includes IP, Router, Routing and L3 Switch.
|
|
Transport Layer
|
End to end delivery. TCP and UDP. SSL, TLS.
|
|
Session Layer
|
Logical Connection
|
|
Presentation
|
Format of the data. ASCII, EBCIDIC, Compression and encryption
|
|
Presentation Layer
|
ENCRYPTION OCCURS
|
|
Application
|
SMTP, POP, IMAP, HTTP, HTTPS, FTP...The applications that do the work independent of the presentation of the "program" utilizing them.
|