You are on page 1of 2

Security + Computer System Security

DCOM 258 E31


Name: Shaamim Ahmed
Chapter 08: Securing Network Media & Devices
Part # 1

Define the following Key Terms (12 points)

1. MAC filtering
MAC filtering is a method used to filter out which computers can access the wireless
network; the WAP does this by consulting a list of MAC addresses that have been
previously entered.
2. Bluesnarfing
Bluesnarfing, the unauthorized access of information from a wireless device through a
Bluetooth connection.
3. Wardriving
War-driving The act of searching for wireless networks by a person in a vehicle
through the use of a device with a wireless antenna, often a particularly strong antenna.
4. Bluejacking
Bluejacking, the sending of unsolicited messages to Bluetooth-enabled devices such as
mobile phones and tablets.
5. Privilege escalation
Privilege escalation The act of exploiting a bug or design flaw in a software or
firmware application to gain access to resources that normally wouldve been protected
from an application or user.
6. Crosstalk
Crosstalk, when a signal transmitted on one copper wire creates an undesired effect on
another wire; the signal bleeds over, so to speak.
7. Data emanation
Data emanation also known as signal emanation, the electromagnetic field generated by a
network cable or network device, which can be manipulated to eavesdrop on
conversations or to steal data.
Part #2.

Short Answer Section (8 points)

1. Describe the following cable types:


a. Twisted-pair
Twisted-pair: A copper-based cable with four pairs of wires (for a total of eight
wires), each of which is twisted together along the length of the cable. It is the
most common type of net- work cable; it sends electrical signals to transfer data
and uses RJ45 plugs to connect to ports on hosts. The most common security
problem with twisted-pair cable is crosstalk, which we discuss later.

Security + Computer System Security


DCOM 258 E31
b. Fiber-optic
Fiber-optic: A glass/plastic-based cable that sends light (photons) instead of
electricity. It is composed of one or more thin strands known as fibers that transfer
the data. Generally, this is the most secure type of cable that can be used in a
network. It is not susceptible to EMI, RFI, or data emanations and is the least
susceptible cable to wiretapping.
c. Coaxial
Coaxial: A less used copper-based cable that has a single copper core. Although
not used for connections to hosts anymore, you might see it used with special
connections, perhaps for the Internet or for video. In smaller companies
networks, it is common to see an RG-6 cable used for the Internet connection. The
most common security risk with coaxial cable is data emanation, which we
discuss later.
2. Identify the characteristics of a strong password.
Strong passwords can be defined as
i. Eight characters or more
ii. At least one uppercase letter
iii. At least one number
iv. At least one special character

You might also like