Network Security Cheat Sheet
Network Security Cheat Sheet
Network Security
Network security involves protecting computer networks from unauthorized access, attacks, or damage. It
Cybercrime
Illegal activities using computers/networks. Examples: identity theft, hacking, data breaches.
- Amendment 2008: Added cyber terrorism, identity theft, child porn laws
Cyber Ethics
- Follow laws
- Respect privacy
- Avoid cyberbullying, piracy, or hacking
Ethical Hacking
Authorized testing of systems to find and fix vulnerabilities. Done by ethical hackers.
- Types: Black Hat (illegal), White Hat (ethical), Grey Hat (mix)
Hacktivism
Attacker vs Hacker
Bluejacking
Encryption converts data into unreadable form; Decryption restores it back using a key.
Cryptography
SSL Certificate ensures secure data transfer over HTTPS (secure HTTP).
MD5
Cryptographic hash function that outputs 128-bit value. Used for checksums. Not secure now due to
collisions.
Ransomware
Zombie
- Signature-based
- Heuristic-based
- Behavior-based
- Cloud-based
- Real-time
- Boot-time
- Packet-filtering
- Stateful Inspection
- Proxy
- NGFW
- Software
- Hardware
- Cloud
IDS and Types
Teardrop Attack
DoS attack using fragmented packets that crash target systems. Mostly patched in modern OS.