Module 1 - Intro to NDE Flashcards

(45 cards)

1
Q

What are Network Security Controls

A

Security features that work together to control access to network resources based on identity management.

Page 17

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What do Network Security Protocols do?

A

Ensure data passing through a network is secure.

Page 17

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are Network Security Devices?

A

A set of devices used to protect computer networks from unwanted traffic and threats.

Page 17

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the categories of Network Security Devices?

A
  • Active devices
  • Passive devices
  • Preventative devices

Page 17

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the ultimate goal of Network Defence?

A

To protect an organisations information, systems and infrastructure
from
* unauthorised access,
* misuse,
* modification,
* service denial
and any degradation or disruptions.

Page 18

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

There are four

What are some potential threats to a network?

A
  • Interruption of services
  • Damaging and exploiting the network
  • Restricting access to computing resources
  • Stealing data

Page 18

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Is a firewall alone sufficient to protect a network?

A

No. Firewalls can be bypassed for intruders to access the system.

Page 18

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

There are six

What does network defence involve?

A
  • Predicting,
  • protecting,
  • monitoring,
  • analysing,
  • detecting
  • and responding
    to unauthorised activities.

Page 18

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the five Information Assurance (IA) principles?

A
  • Confidentiality
  • Integrity
  • Availability
  • Non-Reupdiation
  • Authentication

Page 19

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the confidentiality IA principle?

A

Information shared on a network is not accessed by unauthorised parties.

Page 20

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the integrity IA principle?

A

Information has not been modified or tampered with by unauthorised parties.

Page 20

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the availability IA principle?

A

Information is available to authorised parties without disruption.

Page 20

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the non-repudiation IA principle?

A

There is a trail of responsibility when messages are sent so that the sender can not deny sending it.

Page 21

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the authentication IA principle?

A

No one can access the network without having their identity verified.

Page 21

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the three elements of Network Security?

A
  • Network security controls
  • Network security protocols
  • Network security devices

Page 17

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are four benefits of Network Defence?

A
  • Increased profits
  • Improved productivity
  • Enhanced compliance
  • Client confidence

Page 22

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What are the three main Network Defence challenges?

A
  • Distributed computing environments
  • Emerging threats
  • Lack of network security skills

Page 23

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What are the four types of Network Defence Approaches?

A
  • Preventative
  • Retrospective
  • Reactive
  • Proactive

Page 24

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What are four methods used in the Preventative network defence approach?

A
  • Access control mechanisms - firewalls
  • Admission control mechanisms - Network Access Controls (NAC) and Network Access Protections (NAP)
  • Cryptographic applications - IPSec and SSL
  • Biometric techniques - facial recognitiion

Page 24

20
Q

What are five methods used in the Reactive network defence approach?

A
  • Security monitoring methods such as:
  • An intrusion detection system (IDS)
  • An intrusion prevention system (IPS)
  • Security information management systems (SIMS)
  • Threat reputation services (TRS)

Page 24

21
Q

What three methods are used in the Retrospective network defence approach?

A
  • Fault finding mechanisms - protocol analysers and traffic monitors
  • Security forensics techniques - CSIRT and CERT
  • Post-mortem analysis mechanism - risk and legal assessments

Page 24

22
Q

What are two methods used in the Proactive network defence approach?

A
  • Threat intelligence
  • Risk assessment

Page 24

23
Q

What are seven examples of Administrative Security Controls?

A
  • Regulatory framework compliance
  • Security policy
  • Employee monitoring and supervising
  • Information classification
  • Security awareness and training
  • Separation of duties
  • Principle of least privileges

Page 25

24
Q

What are Administrative Security Controls?

A

Administrative security controls are
* Management limitations
* Operational procedures
* Accountability procedures
and other controls that ensure the security of an organisation.

Page 25

25
What are **Physical Security Controls**?
Controls that provide physical protect of the information, buildings, and all other physical assets of an organisation ## Footnote Page 26
26
What are the three categories of **Physical Security Controls**?
* Prevention controls * Detterence controls * Detection controls ## Footnote Page 26
27
What are four examples of **Prevention Controls**? ## Footnote Physical Security Controls
* Fences * Locks * Biometrics * Mantraps ## Footnote Page 27
28
What are **Deterrence Controls**? ## Footnote Physical Security Controls
Controls that are used to discourage the violation of security policies. They include access controls such as security guards and warning signs. ## Footnote Page 27
29
What are two examples of **Detection Controls**? ## Footnote Physical Security Controls
* CCTV * Alarms ## Footnote Page 27
30
What are **Technical Security Controls**? ## Footnote Network Security Controls
A set of security measues taken to protect data and systems from unauthorised personnel ## Footnote Page 29
31
What are the six components of **Technical Security Controls**? ## Footnote Network Security Controls
* System access controls * Network access controls * Authentication and authorisation * Encryption and protocols * Network security devices * Auditing ## Footnote Page 29
32
What are **System access controls** used for? ## Footnote Technical Security Controls
Restricting access to data based on * Sensitivity (confidentiality) of data * Clearance level * User rights * Permissions ## Footnote Page 29
33
What are **Network access controls**? ## Footnote Technical Security Controls
A set of access control mechanisims for network devices like routers and switches. ## Footnote Page 29
34
What do **Authentication and Authorisation controls** do? ## Footnote Technical Security Controls
Ensure that only users with appropriate privileges can access the system or network resources. ## Footnote Page 29
35
What do **Encryption and Protocols** do? ## Footnote Technical Security Controls
Protect information passing through the network and preserve the privacy and reliability of data. ## Footnote Page 29
36
What are two types of **Network Security Devices**? ## Footnote Technical Security Controls
* Firewall * Intrusion detection system (IDS) ## Footnote Page 29
37
How does **Auditing** help with network security? ## Footnote Technical Security Controls
By tracking and examining network activities so weaknesses in the network can be identified. ## Footnote Page 29
38
Name ten **Network Security Protocols** ## Footnote Network Security Protocols
* RADIUS * TACAS+ * Kerebos * PGP * S/MIME * Secure HTTP * HTTPS * TLS * SSL * IPsec ## Footnote Page 31
39
What are three layers that **Security Protocols** work at? ## Footnote Network Security Protocols
* Transport layer * Network layer * Application layer ## Footnote Page 31
40
Which security protcols work at the **Transport Layer**? ## Footnote Network Security Protocols
* Transport Layer Security (TLS) * Secure Sockets Layer (SSL) ## Footnote Page 31
41
Which security protocols work at the **Network Layer**? ## Footnote Network Security Protocols
* Internet Protocol Security protocol (IPSec) ## Footnote Page 31
42
Which security protocols work at the **Application Layer**? ## Footnote Network Security Protocols
* Pretty Good Privacy (PGP) * Secure/Multi-purpose Internet Mail Extension (S/MIME) * Secure HTTP * Hyper Text Transfer Protocol Secure (HTTPS) * Kerebos * Remote Authentication Dial-In User Service (RADIUS) * Terminal Access Controller Access Control System Plus (TACAS+) ## Footnote Page 31
43
What does **RADIUS** do? ## Footnote Network Security Protocols
Provides centralised authentication, authorisation and accounting for remote access servers to communicate with a central server ## Footnote Page 33
44
What are the **Handshake** steps for **RADIUS**? ## Footnote Network Security Protocols
1. access-request packet (Client) 2. access-accept message and access-challenge or access-reject (RADIUS) 5. accounting-request (Client) 6. accounting-response message (RADIUS) ## Footnote Page 33
45