Day 7 Flashcards

(55 cards)

1
Q

IPsec core protocols

A

Authentication Header (AH) and Encapsulating Security Payload (ESP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Authentication Header (AH)

A

handles authentication services for IPsec

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Encapsulating Security Payload (ESP)

A

encrypts a datagrams payload, ensuring the privacy of the message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

IPsec security modes

A

IPsec provides protection through two security modes: transport and tunnel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Transport Mode

A

host to host or end to end security.
provides security between any two communicating devices or end-points
only the data is encapsulated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Tunnel mode

A

protects communication between routers and not the end hosts

IPsec encapsulates the entire payload

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

CIA triad

A

confidentiality, integrity, availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

five pillars of information assurance

A

confidentiality, integrity, availability, nonrepudiation, authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

hashing

A

a form of one way encryption where data of variable length is input to a hashing algorithm and a value of fixed length results are output.
hashing provides password authentication and file integrity verification.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

password authentication

A

password is hashed using the same algorithm and compared to the stored hash

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

file verification

A

using a hashing algorithm allows a user to verify file integrity regardless of file size.
the hash is also known as a checksum

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

encryption

A

a technique of providing confidentiality by converting plaintext, or ordinary data, into ciphertext.
can be done either symmetrically or asymmetrically

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

symmetric encryption

A

uses a single key to encrypt and decrypt the data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

asymmetric encryption

A

uses a different key for encryption than is used for decryption.
this key pair consists of both a private key and public key.
PKI uses asymmetric encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

digital signatures

A

utilizes hashing functions to associate a sender with data and to be sure a sender is who they say they are

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

certificates

A

electronic documents of credentials usually signed by a third party called a certification authority

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

authentication, authorization, and accounting (AAA)

A

a framework for data protection for databases

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

authentication

A

presenting credentials for access to the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

authorization

A

the determination of what tasks are and are not allowed on the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

accounting

A

keeping a record of such things as login/logoff times, or what services have been accessed.
AAA is suported through two main protocols: RADIUS and TACACS+)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Remote Authentication Dial-In User Service (RADIUS)

A

an AAA standard used in supporting thousands of access points managed by internet service providers and linking them to a single database.
requests are sent to a Network Access Server (NAS)
the three replies are “Access Accept”, “Access Reject”, or “Access Challenge”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Terminal Access Controller Access Control System Plus (TACACS+

A

an AAA protocol developed by Cisco to include access to routers and switches.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

virtual networking

A

aka logical networking, overcomes certain network functions previously hindered by physical or geographic limitations

24
Q

Virtual Local Area Network (VLAN)

A

seperating LAN’s with a switch. VLAN’s logically seperate a single device into different resource groups.

25
trunking
connects VLans that physically reside on different switches
26
Virtual Private Network (VPN)
extends a LAN over an intermediate and usually unsecure infrastructure such as the internet.
27
VPN tunnel
a secure connection that allows remote connections from the internet into the private network
28
tunneling
allows private communications over a public infrastructure while maintaining security
29
cloud computing
an idea by which people and businesses can use needed resources, such as software or hardware, without actually having to purchase them.
30
deployment models
a cloud computing environment can be deployed in different ways depending on customer need.
31
private cloud
a deployment model where one specific company or organization uses the entire cloud infrastructure
32
public cloud
designated for use by the general public and exist on the cloud provider's property
33
community cloud
space occupied by several different tenants that share a common concern
34
hybrid cloud
consists of the combination of two or more cloud deployment models. allows for cloud bursting: additional processing can be handled outside of the normal cloud infrastructure and into another
35
software as a service (SaaS)
the customer use of applications running from a cloud provider. the client has no control over the network, servers, or even the actual application.
36
Platform as a Service (PaaS)
a client creates their own applications or software, but use programming languages and tools supported by the cloud provider,
37
infrastructure as a service (IaaS)
aka hardware as a service (HaaS) the provisioning of processing, storage and networks to a customer. the customer controls the software and even the OS's running on the hardware.
38
threat
``` a network threat is something that has the potential to damage the network, to include data, hosts, or users. most common threats: hardware failures access malware social engineering denial of service ```
39
hardware failures
equipment can fail. to mitigate these failures, redundancy must be maintained
40
access
access is devided up into two main types: physical and logical
41
physical access
physical access should be protected through the use of locking cabinets, doors, and buildings. security guards, cameras and safes are also means of providing physical security.
42
logical access
protects data through the means of logical controls. these controls can be provided by the use of passwords, permissions, access control lists (ACL's), and traffic filtering with devices such as firewalls
43
remote access
the non local access to network systems or resources from a seperate physical location. remote access points should always be shut off when not needed.
44
malicious software (malware)
program or code designed to perform an undesired function on a system
45
virus
a virus replicates itself by making copies of itself viruses do not replicate across networks. activation is the action a virus takes once replicated
46
worm
a worm is like a virus but can send copies of itself to other computers on a network
47
macro
a macro is a form of malware which exploits a programs built in macro function, with malicious results. these viruses use weaknesses in the macro language to accomplish the tasks of replication and activation
48
trojan
a piece of malware that looks legitimate to a user but performs malicious functions in the background. trojans to not replicate like viruses or worms do
49
rootkit
rootkits are trojans that use low level computing functions in order to hide themselves from these anti-malware tools. rootkits allow for continued privileged access to the system
50
adware/spyware
adware is a program that use functions such as pop-up windows to flood a user with advertisements. spyware is software that sends information about your system over the internet
51
dealing with malware
anti-malware programs training procedures
52
social engineering
the process of tricking people to gain unauthorized access to information
53
phishing
a phishing attack consists of both creating a site, which seems trusted, and then soliciting people to visit it. phishing attacks launched through email include a hyperlink that when clicked, takes a victim to the attacker's site
54
denial of service (DoS)
involves an adversary flooding a network with enough traffic to overwhelm it
55
distributed denial of service (DDoS)
overwhelms a system like DoS but through multiple source computers. an adversary first takes control of a computer called the command and control server. each of the comptuers being controlled to participate in a DDoS attack is called a zombie. a group of computers under the control of an operator is called a botnet.