From Wikibooks, open books for an open world
This page may need to be
reviewed for quality.
2.1 Differentiate between the different port & protocols, their respective threats and mitigation techniques
[edit | edit source]
- Antiquated protocols
- TCP/IP hijacking
- Null sessions
- Spoofing
- Man-in-the-middle
- Replay
|
- DoS (Denial of Service)
- DDoS (Distributed DoS)
- Domain Name Kiting
- DNS poisioning
- ARP poisioning
|
2.2 Distinguish between network design elements and components
[edit | edit source]
- DMZ
- VLAN
- NAT
- Network interconnections
|
|
- NIDS (Network Based Intrusion Detection System)
- NIPS (Network Based Intrusion Prevention System)
- Firewalls
- Proxy servers
|
- Honeypot
- Internet content filters
- Protocol analyzers
|
- NIDS
- Firewals
- Proxy servers
- Internet content filters
- Protocol analyzers
2.5 Explain the vulnerabilities and mitigations associated with network devices
[edit | edit source]
- Privelege escalation
- Weak passwords
- Back doors
- Default accounts
- DOS
2.7 Explain the vulnerabilities and implement mitigations associated with wireless networking
[edit | edit source]
- Data emanation
- War driving
- SSID broadcast
- Blue jacking
|
- Bluesnarfing
- Rogue access points
- Weak encryption
|