?cyber Questions?
?cyber Questions?
OSI - Physical(raw bit electric signals through WiFi, Bluetooth, fiver optic),
Data-link(Frames, Mac Address, Error detection and correction),
Network(packets), Transport(segments), Session(Netbios,netstat),
Presentation(Encryption), Application
SMPT- (when u click send)sends emails and check recipient address through
DNS, İMAP - receives(access), stores and manages emails, POP3 -Downloads
emails
[email protected]
CISSP, CEH certificates for Security engineers
NGFW - IPS, Application layer inspection (not only headers, but content
based exploit prevent, http,ftp), web filtering (urls, content, tag), DLP(role
based access control), multiple cihazların işi(sandboxing, antivirus,malware
detection), Filter users and their roles or GpU, VPN encrypted traffic-Palo Alto
Edr - behaviour analysis (login attempts, data transfer), Ai- machine learning,
can prevent even unknown threats(RESPONSE). Isolate infected endpoints,
files, processes, use pre-defined rules, Network analysis, Can roll back
system changes malwares done.
Identity theft Protection - Strong password, don't share info, check what u
click and where u shop, install malware tools
Worm- like virus replicate, but target whole network. Enter by vulnerability or
email
DNS - U click domain and 1)Query is sent to Local Dns Resolver and it checks
cache to see ip 2) If it doesn't find, sends Recursive query to Root server(13
in the world) and this server 3)refers query to TLD(.com) server and 4)this
server refers it to Authoritative server which maintains ip records.5) And it
returns ip to Recursive Dns Resolver 6) And this returns to Local Resolver 7)
Browser uses Ip address to connect to Web server hosting the website. 8)
Web server sends the content to browser which displays on the screen.
NIC- Network Interface card : has own Mac address. Convert data to electric
signals. Enable to connect to internet
Hub - send data to all regardless of they need it or not, causes congestion,
low performance
ARP poisoning - Connect ur Mac with other Ip address for e. default gateway.
Good for Man in the middle and session hijacking
ARP requests - if can't find in cache, broadcasts to learn the MAC address of
a device associated with a particular IP.
VLAN: Helps to group work stations that are not within the same locations
into the same broadcast domain
CIDR : 192.168.1.0/24 means the first 24 bits are the Network portion, and
the rest 8 bits are for Hosts.
/24 (8 host bits): 2^8 - 2 = 254 usable addresses (subtracting 2 for network
and broadcast addresses).
1. Symmetric Keys: The same key is used for both encryption and decryption.
Example algorithms include AES and DES.
2. Asymmetric Keys: Uses a public key for encryption and a private key for
decryption. RSA is a common example.(PKI-Public Key Infrastructure+Digital
Certificate)
Prevent data breach - Train employes, strong password, monitor traffic, limit
access(ACL), patch vulnerability, encrypt data, 2FA,breach recovery
plan(cloud)