Network Security Study Guide
Network Security Study Guide
Nota importada desde Inbox durante consolidacion bulk.
1. Port Scanning Basics
- Open Ports Identification: A basic port scanner is used to identify open ports on a network.
2. Port Number Classifications
- Well-Known Ports: Ports ranging from 0 to 1023 are classified as "Well-Known Ports."
3. Responses to Port Scanning
- Blocked Ports: If a port is blocked, typically, there will be no response from a port scan.
4. Scanning Techniques
- TCP/Half Open Scan (SYN Scan): This stealthy scan method sends a SYN message but does not complete the TCP handshake, keeping the scanner anonymous.
5. Protocol Analyzers
- Alternative Names: Commonly known as "Sniffers" and "Traffic Analyzers."
6. Packet Sniffers
- Legitimate Use: Packet sniffers are not exclusively for malicious use; they are vital in legitimate network management.
7. Vulnerability Scanners
- Reporting Module: This component produces high-level graphs and reports for executive analysis.
8. Detecting External Threats
- Internet-Facing Hosts Scanning: External threats are detected by scanning hosts exposed to the internet.
9. Common Vulnerability Score (CVSS) Components
- Key Components: The CVSS is made up of three parts: Base, Temporal, and Environmental.
10. CVSS: Attack Complexity
- Base-Exploitability Subscore: Reflects the complexity of an attack within the CVSS framework.
11. CVSS: Integrity Aspect
- Base-Impact Subscore: This subscore within the CVSS includes aspects like integrity.
12. CVSS: Remediation Level
- Temporal Score: The remediation level of a vulnerability is reflected here.
13. CVSS: Impact Subscore
- Base-Impact Subscore: This score in the CVSS reflects the impact of a vulnerability.
14. Security Technical Implementation Guides (STIGs)
- Publicly Available: Contrary to some beliefs, STIGs are not restricted to US military use and are publicly accessible.
15. Center for Internet Security (CIS) Implementation Groups
- Middle-Level Security Requirements: Includes CIS Sub-Controls for small, commercial software environments and those focused on sensitive client or company information management.