Flashcards for Section 4.0 - Network Security
(77 cards)
What is the CIA Triad?
Confidentiality, Integrity, and Availability; a model to guide security policies ensuring data protection, accuracy, and accessibility.
What is Confidentiality in the CIA Triad?
Ensuring data is accessible only to authorized users
What is Integrity in the CIA Triad?
Maintaining data accuracy and trustworthiness, preventing unauthorized modifications, using hashing or checksums.
What is Availability in the CIA Triad?
Ensuring data and systems are accessible to authorized users when needed
What is the principle of least privilege?
Granting users only the access necessary for their tasks
What is separation of duties?
Dividing tasks among multiple users to prevent fraud or errors
What is zero trust?
A security model requiring continuous verification of all users and devices
What is defense in depth?
A layered security approach using multiple controls (e.g., firewalls, IDS, encryption) to protect against threats.
Why is defense in depth effective?
Multiple layers ensure that if one control fails, others can still protect the network, reducing single points of failure.
What is multifactor authentication (MFA)?
Requiring two or more authentication factors (e.g.
What is single sign-on (SSO)?
Allowing users to authenticate once and access multiple systems without re-authenticating.
What is RADIUS in authentication?
Remote Authentication Dial-In User Service
What is LDAP in authentication?
Lightweight Directory Access Protocol
What is risk management in networking?
Identifying
What is a risk assessment?
Evaluating potential threats
What is risk mitigation?
Implementing controls (e.g., firewalls, patches) to reduce the likelihood or impact of risks.
What is a Denial of Service (DoS) attack?
Overwhelms a network or system with traffic to disrupt service availability
What is a Distributed Denial of Service (DDoS) attack?
A DoS attack using multiple compromised devices (botnets) to flood a target
What is an on-path attack?
An attack where an attacker intercepts and potentially alters communication between two parties
What is ARP spoofing?
An on-path attack where an attacker sends fake ARP messages to associate their MAC address with a legitimate IP
What is VLAN hopping?
An attack exploiting misconfigured VLANs to access unauthorized VLANs
How can VLAN hopping be prevented?
Disable unused ports, use non-default VLANs, and configure trunk ports to allow only specific VLANs.
What is spoofing in networking?
Falsifying data to appear as a trusted source
What is IP spoofing?
Forging the source IP address in packets to hide the attacker’s identity or impersonate a trusted host.