Module 3 Flashcards
(37 cards)
What is Checkpoint.com?
Shows a live cyber threat map.
What are switches in a network?
Switches: help connect network segments together to allow for device connectivity.
What are Servers/Clients in regards to networking?
Servers/Clients: are devices that transfer messages over the network.
What is Transmission Medium?
Transmission Medium: is the medium used to transmit data over the network. This could be
ethernet, fiber, wireless, or various other mediums.
What is router?
Router: connect different networks by forwarding data packets between them.
What is a modem?
Modem: (stands for modulator/demodulator) are responsible for converting signals between
different mediums. For example, converting fiber to ethernet.
What is an Endpoint Device?
Endpoint devices: Where messages on a network originated from and are received.
What is a server?
Server: Devices that transfer messages over the network and facilitate communication
between end devices.
What is a network?
Network: A group of devices connected to allow the sharing of data and resources
What is a packet?
Packet: Pieces of information (data) sent across a network.
What is a protocol?
Protocol: Predefined sets of rules describing how something should work or behave
What is a LAN?
Local Area Network (LAN): A type of network infrastructure which connects users and end devices located in a small geographical area.
What is a MAN?
Metropolitan Area Network (MAN): A type of network infrastructure that spans across a city or a metropolitan area.
What is a WAN?
Wide Area Network (WAN): A collection of LANs spread over a large geographical area.
Why is there a PAN?
Personal Area Network (PAN): A small network of two personal devices using wireless technology.
What is Defense in Depth?
Defense in Depth: cybersecurity strategy that involves implementing multiple layers of security controls to protect against various types of threats.
What is the CIA Triad?
The CIA triad represents the three pillars of information security: confidentiality, integrity, and availability, as follows:
Confidentiality – preserving authorized restrictions on information access and disclosure, including means for protecting personal privacy and proprietary information
Integrity — guarding against improper information modification or destruction and ensuring information non-repudiation and authenticity
Availability – ensuring timely and reliable access to and use of information
What is the NIST cybersecurity framework?
Identify – develop an organizational understanding to manage cybersecurity risk to systems, people, assets, data, and capabilities
Protect – develop and implement appropriate safeguards to ensure delivery of critical services
Detect – develop and implement appropriate activities to identify the occurrence of a cybersecurity event
Respond – develop and implement appropriate activities to take action regarding a detected cybersecurity incident
Recover – develop and implement appropriate activities to maintain plans for resilience and to restore any capabilities or services that were impaired due to a cybersecurity incident
What is ARP poisoning?
ARP Poisoning: An attack that compromises the address resolution process of a local
machine
What is a network attack?
Network attacks: are malicious activities aimed at disrupting or gaining unauthorized access to computer networks.
What is DoS? (Denial of Service)
Denial-of-Service (DoS): An attack that causes a service to fail by flooding the target with traffic or sending information that triggers a service crash
What is Distributed DoS?
Distributed DoS: A DoS attack that is distributed among multiple sources to create a more
considerable amount of traffic.
What is Exploit?
Exploit: techniques or code blocks designed to take advantage of software vulnerabilities
What is Data in Transit?
Data in transit: Data moving from one location to another.