5.1 Key Security Concepts Flashcards
Define key security concepts (threats, vulnerabilities, exploits, and mitigation techniques). (21 cards)
What are the key security concepts in network security?
- Threat
- Vulnerability
- Exploit
- Mitigation
Threat – Any potential danger to an asset or system integrity.
Vulnerability – A weakness or gap in a system that can be exploited.
Exploit – A method or tool used to take advantage of vulnerabilities.
Mitigation – Actions taken to reduce the severity or impact of threats.
List three common network threats.
- Malware
- Phishing Attacks
- Denial of Service (DoS) Attacks
Malware – Malicious software designed to harm or exploit systems.
Phishing Attacks – Deceptive attempts to steal sensitive information.
Denial of Service (DoS) Attacks – Overloading a system to disrupt its functionality.
List three types of malware.
- Viruses
- Worms
- Trojans
Viruses – Malicious programs that attach to files and spread when executed.
Worms – Self-replicating malware that spreads without user action.
Trojans – Deceptive software that appears legitimate but contains harmful code.
Why are weak passwords considered vulnerabilities?
They can be easily guessed or cracked, allowing unauthorized access.
Implementing complex passwords and multi-factor authentication mitigates unauthorized access risks.
True or False:
A zero-day exploit refers to vulnerabilities that are known publicly.
False
Zero-day exploits target vulnerabilities unknown to vendors, giving no prior notice or opportunity to patch.
Define:
phishing attacks
Fraudulent emails or websites trick users into revealing sensitive data.
Phishing relies on social engineering to manipulate victims into providing credentials, financial information, or personal details.
What is a commonly used tool to mitigate phishing attacks.
Email filtering solutions
Email filters help detect and quarantine suspicious emails, reducing phishing attack risks.
How does domain spoofing contribute to phishing attacks?
Attackers impersonate legitimate domains to trick users.
Domain spoofing creates deceptive URLs that mimic trusted websites, increasing the success rate of phishing attacks.
What is social engineering?
A tactic that manipulates people into revealing sensitive information.
This often* exploits trust and lack of awareness* to deceive users.
List three network mitigation techniques.
- Firewalls
- Intrusion Detection Systems (IDS)
- Antivirus software
Firewalls – Block unauthorized network traffic.
Intrusion Detection Systems (IDS) – Monitor and alert on suspicious activity.
Antivirus Software – Detect and remove malicious programs.
What is the principle of least privilege (PoLP)?
Users and systems should have only the minimum access necessary.
PoLP reduces the risk of insider threats and limits potential damage if credentials are compromised.
What are two types of network vulnerabilities?
- Software vulnerabilities
- Misconfigured devices
Software Vulnerabilities – Flaws in programs that attackers can exploit.
Misconfigured Devices – Improper settings that create security gaps.
True or False:
Antivirus software alone ensures complete network security.
False
Antivirus software must be part of a broader, layered defense strategy.
Fill in the blank:
A firewall primarily protects networks by filtering ______.
traffic
Firewalls filter incoming and outgoing network traffic based on predefined security rules.
Why is regular patching critical in security?
It addresses vulnerabilities, preventing exploitation.
Timely patching is essential in defending against known threats.
What is a zero-trust security model?
A security model that requires continuous verification.
Zero-trust assumes no entity is trustworthy by default. It enforces strict authentication, least privilege access, and micro-segmentation to limit unauthorized movement within a network.
What’s a technique to mitigate unauthorized access to network devices?
Secure passwords and access control lists (ACLs).
ACLs enforce policies by restricting unauthorized access and enhancing network security.
What is the goal of penetration testing?
To discover vulnerabilities before attackers exploit them.
Penetration testing simulates real-world attacks to strengthen security measures.
Fill in the blank:
Intrusion Detection Systems (IDS) primarily ______ network threats.
detect
IDS monitors network traffic, generating alerts for suspicious activity.
What is the role of encryption in network security?
It protects data confidentiality by converting it into unreadable format.
Encryption ensures data privacy, even if intercepted by unauthorized parties.
True or False:
End-to-end encryption (E2EE) keeps data encrypted from sender to receiver.
True
E2EE prevents unauthorized access to data in transit, commonly used in messaging apps and secure communications.