who can intercept the contents of a file transmitted over the network in clear text? course hero

by Timmothy Hettinger III 9 min read

What is the next step in the information security system?

Once the information security system is implemented, the next step is to provide constant maintenance

How does CIA provide confidentiality?

provides confidentiality to sensitive information by implementing encryption and decryption. Using data integrity, It ensures that information either stores on computers or transmits via communication links should not be altered by an unauthorized users. If alters, it should be detected by the destination system. The availability in CIA model ensures that all resources (such as hardware, software, network, information, etc) should be available to authorized users whenever they need them.

What is user authentication?

User authentication ensures that the received message has not been modified during the transmission.

What is the purpose of a secure network?

ensures that an attacker cannot change or destroy information, either while it is on a computer or while it is travelling across a network.

What is computer system security?

ensures that computer systems are working properly and they are available to authorized users whenever they need them

Who should access resources?

Resources should be accessible at the required time and usable only by the authorized entity

Does computer security concern what information is stored in computer system?

Computer Security does not concern what information is stored in computer system and where that information came from.

What is the application of computing and network resources to try every possible combination of options of a password called?

The application of computing and network resources to try every possible combination of options of a password is called a dictionary attack.

Why do sniffers add risk to the network?

Sniffers add risk to the network because many systems and users send information on local network in clear text. A sniffer program shows all the data going by, including passwords, the data inside the files, and screens full of sensitive data from applications.

What is the primary mission of information security?

Information security's primary mission is to ensure that systems and their contents retain their confidentiality at any cost.

What is packet munchkin?

Packet munchkins use automated exploits to engage in distributed denial-of-service attacks.

How can human error be prevented?

Much human error or failure can be prevented with effective training and ongoing awareness activities.

Why use dictionaries in password reset?

Organizations can use dictionaries to regulate password selection during the reset process and this guard against easy-to-guess passwords.

Which watchdogs investigate software abuse?

Two watchdog organizations that investigate allegations of software abuse are the Software & Information Industry Association (SIIA) and National Security Agency (NSA).

Where is the summary of captured data?

Just below the log entries, there is a panel with a summary of captured data. Look for the summary that says Line-based text data: application/x-www-form-urlencoded

What is a network sniffer?

Network Sniffers are programs that capture low-level package data that is transmitted over a network. An attacker can analyze this information to discover valuable information such as user ids and passwords.

What is a MAC Flooding?

MAC flooding is a network sniffing technique that floods the switch MAC table with fake MAC addresses. This leads to overloading the switch memory and makes it act as a hub. Once the switch has been compromised, it sends the broadcast messages to all computers on a network. This makes it possible to sniff data packets as they sent on the network.

How does MAC flooding work?

MAC flooding works by flooding the MAC table address list with fake MAC addresses. This makes the switch to operate like a HUB

Why is it called passive sniffing?

It is called passive sniffing because it is difficult to detect. It is also easy to perform as the hub sends broadcast messages to all the computers on the network. Active sniffing is intercepting packages transmitted over a network that uses a switch.

What can be used to filter discovered MAC addresses?

Authentication, Authorization and Accounting servers can be used to filter discovered MAC addresses.

What is port security?

Some switches have the port security feature. This feature can be used to limit the number of MAC addresses on the ports. It can also be used to maintain a secure MAC address table in addition to the one provided by the switch.

image