Network Security Study Guide

Network Security Study Guide

Nota importada desde Inbox durante consolidacion bulk.

1. Port Scanning Basics

  • Open Ports Identification: A basic port scanner is used to identify open ports on a network.

2. Port Number Classifications

  • Well-Known Ports: Ports ranging from 0 to 1023 are classified as "Well-Known Ports."

3. Responses to Port Scanning

  • Blocked Ports: If a port is blocked, typically, there will be no response from a port scan.

4. Scanning Techniques

  • TCP/Half Open Scan (SYN Scan): This stealthy scan method sends a SYN message but does not complete the TCP handshake, keeping the scanner anonymous.

5. Protocol Analyzers

  • Alternative Names: Commonly known as "Sniffers" and "Traffic Analyzers."

6. Packet Sniffers

  • Legitimate Use: Packet sniffers are not exclusively for malicious use; they are vital in legitimate network management.

7. Vulnerability Scanners

  • Reporting Module: This component produces high-level graphs and reports for executive analysis.

8. Detecting External Threats

  • Internet-Facing Hosts Scanning: External threats are detected by scanning hosts exposed to the internet.

9. Common Vulnerability Score (CVSS) Components

  • Key Components: The CVSS is made up of three parts: Base, Temporal, and Environmental.

10. CVSS: Attack Complexity

  • Base-Exploitability Subscore: Reflects the complexity of an attack within the CVSS framework.

11. CVSS: Integrity Aspect

  • Base-Impact Subscore: This subscore within the CVSS includes aspects like integrity.

12. CVSS: Remediation Level

  • Temporal Score: The remediation level of a vulnerability is reflected here.

13. CVSS: Impact Subscore

  • Base-Impact Subscore: This score in the CVSS reflects the impact of a vulnerability.

14. Security Technical Implementation Guides (STIGs)

  • Publicly Available: Contrary to some beliefs, STIGs are not restricted to US military use and are publicly accessible.

15. Center for Internet Security (CIS) Implementation Groups

  • Middle-Level Security Requirements: Includes CIS Sub-Controls for small, commercial software environments and those focused on sensitive client or company information management.

Themes