Basics Flashcards
(24 cards)
3 main types of Physical Security Controls
Access Controls, Monitoring, and Deterrents
Access Control Examples
Mantraps, Turnstiles/Gates, Electronic Doors
Monitoring Controls Examples
CCTV, Security Guards, Intrusion Detection Systems
Deterrent Examples
Warning Signs, Fences, Guard Dogs, Security Lighting, CCTV Cameras
7 types of Endpoint Security
HIDS, HIPS, Anti-Virus Solutions, Log Monitoring, Endpoint Detection and Response (EDR), Vulnerability Scanning, Compliance Scanning
4 types Email Security
Spam Filter, Data Loss Prevention, Email Scanning, Security Awareness Training
5 types of Network Security
Network Intrusion Detection, Network Intrusion Prevention, Firewalls, Log Monitoring, Network Access Control
Authentication
Something you know, Something you have, something you are
Authorization
What the authenticated user is permitted to do/access
Accountability
the process of being able to identify what has happened and when
What is Transmission Control Protocol (TCP)
a connection-oriented protocol that allows two systems to establish a connection that will enable the two-way transmission of data. Any data loss is detected and automatically corrected, which is why TCP is a reliable protocol.
What layer does TCP work at?
transport
How do systems communicate with each other using TCP?
- The requesting client sends the server an SYN (synchronize) packet with a random number, which ensures that data is sent in the right order and nothing is missed.
- The server receives the packet and accepts the connection by sending an SYN-ACK (synchronize acknowledgment) packet back to the client, including the client’s sequence number plus 1. It also transmits its own sequence number to the requesting client.
- Finally, the client acknowledges the receipt of the SYN-ACK segment by sending its own ACK packet, which in this case contains the server’s sequence number plus 1. At the same time, the client can already begin transferring data to the server.
What is User Datagram Protocol (UDP)?
a protocol that allows datagrams to be sent without connection in IP-based networks. To achieve the desired services on the target hosts, it uses ports that are listed as one of the core components in the UDP header.
How is UDP connectionless?
it takes place without an existing connection between addressee and recipient. The respective packets are then sent to the preferred IP address, specifying the target port, without the computer behind them having to respond. However, if packets are also to be returned to the recipient, the UDP header can optionally also contain the source port.
Which is faster? TCP or UDP
UDP
Which is more secure? TCP or UDP
TCP
Internet Control Message Protocol used for?
used by network devices to diagnose network communication issues. ICMP is mainly used to determine whether or not data is reaching its intended destination in a timely manner. Commonly, the ICMP protocol is used on network devices, such as routers
What are the 7 layers of the OSI Model
Application, Presentation, Session, Transport, Network, Data Link, Physical
Switch
A smart Hub, knows where to send data instead of sending to everyone. Uses MAC addresses
Hub
A network device that connects all devices on a Local-Area-Network or LAN. When a system sends data to the hub on one port, the hub will broadcast these to all other attached devices
Bridge
A network bridge device works to connect separate networks to make them into one larger network. This is different than a router, which allows networks to be connected but work independently. In the OSI model, bridging works at Layer 2, the Data Link Layer.
Router
A router is a network device that forwards data based on a logical address. In the case of TCP/IP networks, the router would forward data based on the IP addresses of systems.
Firewall
A firewall is a network device that provides fundamental network security, by monitoring incoming and outgoing traffic and determining whether to allow or block it, based on rules.