Network Security

Get Started. It's Free
or sign up with your email address
Network Security by Mind Map: Network Security

1. Current State of Cybersecurity

1.1. Security Terms

1.1.1. Assets

1.1.2. Valunerability

1.1.3. Threat

1.1.4. Exploit

1.1.5. Mitigation

1.1.6. Risk

1.2. Vectors of Network Attack

1.2.1. Inside corporate network

1.2.2. outside corporate network

1.3. Data Loss

1.3.1. Data lose result to

1.3.1.1. Brand damage

1.3.1.2. Loss of competitive advantage

1.3.1.3. Loss of customers

1.3.1.4. Loss of revenue

1.3.1.5. fines and civil penalties

1.3.1.6. Significant cost

1.3.2. Data Loss Vendors

1.3.2.1. Email/Social Networking

1.3.2.2. Unencrypted Devices

1.3.2.3. Cloud Storage Devices

1.3.2.4. Removable Media

1.3.2.5. Hard Copy

1.3.2.6. Improper Access Control

2. Threat Actors

2.1. Types of hackers

2.1.1. White Hat Hackers

2.1.2. Gray Hat Hackers

2.1.3. Black Hat Hackers

2.2. Hacking terms

2.2.1. Script Kiddies

2.2.2. Vulnerability Broker

2.2.3. Hacktivists

2.2.4. cyber criminals

2.2.5. State-Sponsored

3. Threat Actor Tools

3.1. Penetration Testing Tool

3.1.1. Password Crackers

3.1.2. Wireless Hacking Tools

3.1.3. Network Scanning and Hacking Tools

3.1.4. Packet Crafting Tools

3.1.5. Packet Sniffers

3.1.6. Rootkit Detectors

3.1.7. Fuzzers to Search Vulnerabilities

3.1.8. Forensic Tools

3.1.9. Debuggers

3.1.10. Hacking Operating Systems

3.1.11. Encryption Tools

3.1.12. Vulnerability Exploitation Tools

3.1.13. Vulnerability Scanners

3.2. Attack Type

3.2.1. Eavesdropping Attack

3.2.2. Data Modification Attack

3.2.3. IP Address Spoofing Attack

3.2.4. Password-Based Attacks

3.2.5. Denial of Service Attack

3.2.6. Man-in-the-Middle Attack

3.2.7. Compromised-Key Attack

3.2.8. Sniffer Attack

4. Malware

4.1. Types

4.1.1. Viruses

4.1.1.1. Boot Sector virus

4.1.1.2. Firmware viruses

4.1.1.3. Macro virus

4.1.1.4. Program viruses

4.1.1.5. Script viruses

4.1.2. Trojan Horses

4.1.2.1. Remote-access

4.1.2.2. Data-sending

4.1.2.3. Destructive

4.1.2.4. Proxy

4.1.2.5. FTP

4.1.2.6. Security software disabler

4.1.2.7. Denial of Service

4.1.2.8. Keylogger

4.1.3. Adware

4.1.4. Ransomware

4.1.5. Rootkit

4.1.6. Spyware

4.1.7. Worm

5. Common Network Attacks

5.1. Reconnaissance Attacks

5.1.1. Perform an information query of a target

5.1.2. Initiate a ping sweep of the target network

5.1.3. Initiate a port scan of active IP addresses

5.1.4. Run vulnerability scanners

5.1.5. Run exploitation tools

5.2. Access Attacks

5.2.1. Password Attacks

5.2.2. Spoofing Attacks

5.2.3. Social Engineering Attacks

5.2.3.1. Pretexting

5.2.3.2. Phishing

5.2.3.3. Spear phishing

5.2.3.4. Spam

5.2.3.5. Something for Something

5.2.3.6. Baiting

5.2.3.7. Impersonation

5.2.3.8. Tailgating

5.2.3.9. Shoulder surfing

5.2.3.10. Dumpster diving

5.3. Dos

5.3.1. Overwhelming Quantity of Traffic

5.3.2. Maliciously Formatted Packets

6. IP Vulnerabilities and Threats

6.1. ICMP attacks

6.1.1. ICMP echo request and echo reply

6.1.2. ICMP unreachable

6.1.3. ICMP mask reply

6.1.4. ICMP redirects

6.1.5. ICMP router discovery

6.2. Amplification and reflection attacks

6.3. Address spoofing attacks

6.3.1. Non-blind spoofing

6.3.2. Blind spoofing

6.4. Man-in-the-middle attack

6.5. Session hijacking

7. TCP and UDP Vulnerabilities

7.1. TCP

7.1.1. control bits

7.1.1.1. URG

7.1.1.2. ACK

7.1.1.3. PSH

7.1.1.4. RST

7.1.1.5. SYN

7.1.1.6. FIN

7.1.2. Services

7.1.2.1. Reliable delivery

7.1.2.2. Flow control

7.1.2.3. Stateful communication

7.1.3. Attack

7.1.3.1. TCP SYN Flood Attack

7.2. UDP

7.2.1. Attack

7.2.1.1. UDP Flood Attacks

8. IP Services

8.1. ARP

8.1.1. ARP Cache Poisoning

8.2. DNS

8.2.1. DNS open resolver attacks

8.2.1.1. DNS cache poisoning attacks

8.2.1.2. DNS amplification and reflection attacks

8.2.1.3. DNS resource utilization attacks

8.2.2. DNS stealth attacks

8.2.2.1. Fast Flux

8.2.2.2. Double IP Flux

8.2.2.3. Domain Generation Algorithms

8.2.3. DNS domain shadowing attacks

8.2.4. DNS tunneling attacks

8.3. DHCP

8.3.1. DHCP spoofing attack

8.3.2. Wrong default gateway

8.3.3. Wrong DNS server

8.3.4. Wrong IP address

9. Network Security Best Practices

9.1. Confidentiality, Availability, and Integrity

9.2. The Defense-in-Depth Approach

9.3. Firewalls

9.4. IPS

9.5. Content Security Devices

10. Cryptography

10.1. Securing Communications

10.1.1. Data Integrity

10.1.1.1. Hash Functions

10.1.1.1.1. MD5 with 128-bit Digest

10.1.1.1.2. SHA Hashing Algorithm

10.1.1.1.3. SHA-2

10.1.2. Origin Authentication

10.1.3. Data Confidentiality

10.1.3.1. Symmetric Encryption

10.1.3.1.1. Data Encryption Algorithm (DES)

10.1.3.1.2. 3DES (Triple DES)

10.1.3.1.3. Advanced Encryption Standard (AES)

10.1.3.1.4. Software-Optimized Encryption Algorithm (SEAL)

10.1.3.1.5. Rivest ciphers (RC) series algorithms

10.1.3.2. Asymmetric Encryption

10.1.3.2.1. Protocols

10.1.3.2.2. Algorithm

10.1.4. Data Non-Repudiation

10.1.4.1. Data Non-Repudiation