Network Security Flashcards

(47 cards)

1
Q

Confidentiality

A

Keeping the data private and safe, only people who should access data, can
Encryption
Authentication to access resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Symmetric Encryption
examples
cons

A
sender and receiver share the same key
DES - weak, snmpv3
3DES
AES - strong, WPA2
cons: key management, poor scalability
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Asymmetric Encryption
example
cons

A

Uses different keys for sender and receiver
RSA: most popular, uses public key infrastructure PKI
used for online shopping (HTTPS)
slower than symmetric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Integrity

A

Ensures data has not been modified in transit
Verifies the source that traffic originates from
uses hashing
ex: MD5, SHA1, SHA256

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Availability

A

Measures accessibility of the data

Increased by designing redundant networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Threat

A

A person or event that has the potential for impacting a valuable
resource in a negative manner
external: outside org
internal: inside org

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Technical Vulnerabilities

A

System-specific conditions that create security weaknesses
Common Vulnerabilities and Exposures: CVE (Known vulnerabilities)
Zero-Day Vulnerability (Brand new vulnerability)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Exploit

A

Piece of software code that takes advantage of a security flaw or
vulnerability within a system or network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Security Risk Assessment

A
Used to identify, assess, and implement key security controls within an
application, system, or network
-threat
-vulnerability
-penetration
-posture
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Threat Assessment

A

Focused on the identification of the different threats that may wish to
attack or cause harm to your systems or network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Vulnerability Assessment

A

Focused on identifying, quantifying, and prioritizing the risks and
vulnerabilities in a system or network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Penetration Test

A

Evaluates the security of an IT infrastructure by safely trying to exploit
vulnerabilities within the systems or network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Posture Assessment

A

Assesses cyber risk posture and exposure to threats caused by
misconfigurations and patching delays

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Business Risk Assessment

A

Used to identify, understand, and evaluate potential hazards in the
workplace
-process
-vendor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Process Assessment

A

The disciplined examination of the processes used by the organization
against a set of criteria

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Vendor Assessment

A

The assessment of a prospective vendor to determine if they can
effectively meet the obligations and the needs of the business

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Least Privilege

A

Using the lowest level of permissions or privileges needed in order to
complete a job function or admin task

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

(RBAC)

A

Role-Based Access Control
An access model that focuses on a group of
permissions versus an individual’s permissions

Mandatory Access Control: system decides, military classification
Discretionary Access Control: resource owner decides

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Zero-Trust

A

A security framework that requires users to be authenticated and
authorized before being granted access to applications and data

20
Q

Defense in Depth

A

Cybersecurity approach in which a series of
defensive mechanisms are layered in order to protect valuable data and
information
Physical, logic, administrative

21
Q

Screen Subnet the artist formally known as dmz

A

Subnet in the network architecture that uses a single firewall with three
interfaces to connect three dissimilar networks
Triple-homed firewall (internet, dmz, intranet)

22
Q

Separation of Duties

A

Prevent frauds and abuse by distributing various tasks and approval
authorities across a number of different users

23
Q

(NAC)

A

Network Access Control
Ensures a device is scanned to determine its current state of security prior to
being allowed network access
IEEE 802.1x - Used in port-based Network Access Control

24
Q

Honeypot/ Honeynet

A

Attracts and traps potential attackers to counteract any attempts at
unauthorized access to a network
Track habits of attackers

25
Multifactor Authentication
Authenticates or proves an identity using more than one method Something you know (username, pins, passwords) Something you have (cards, RFID tags, RSA key fob) Something you are (fingerprint, retina) Something you do (signature, voice) Somewhere you are (geotagging/fencing)
26
Dictionary Attack
Guesses the password by attempting to check every single word or phrase contained within a word list, called a dictionary
27
Brute Force Attack
Tries every possible combination until they figure out the password good security - min 12 characters
28
Hybrid Attack
Combination of dictionary and brute force attacks
29
(LDAP)
``` Lightweight Directory Access Protocol Validates a username and password combination against an LDAP server as a form of authentication Port 389 LDAP Port 636 LDAP Secure ```
30
Local Authentication
Process of determining whether someone or something is who or what it local user login on pc
31
Kerberos
Focused on authentication and authorization within a Windows domain environment Provides secure authentication over an insecure network
32
(RADIUS)
Remote Authentication Dial-In User Service Network Access Protocol Provides centralized administration of dial-up, VPN, and wireless network authentication, authorization, accounting udp
33
(NAC)
Network Access Control Ensures a device is scanned to determine its current state of security prior to being allowed network access IEEE 802.1x - Used in port-based Network Access Control
34
(TACACS+)
Terminal Access Controller Access Control System Plus Network Access Protocol Used to perform the role of an authenticator in an 802.1x network tcp Ensure Port 49 is open Excellent if using Cisco devices
35
802.1x
A standardized framework that’s used for port-based authentication on both wired and wireless networks
36
(EAP)
Extensible Authentication Protocol | Allows for numerous different mechanisms of authentication
37
Indoor and Outdoor cameras
Indoor cameras tend to be lighter, cheaper, and easier to install
38
Infrared System
Displays images based on the amount of heat in a room Quickly and easily identify where a person is inside the room Identify hot spots in the room and detect gear that could overheat before it actually does
39
Ultrasonic Camera
A type of surveillance camera that uses sound-based detection
40
Asset Tag
Identifies a piece of equipment using a unique serial number, code, or barcode Reduce theft and helps to identify the device
41
Tamper Detection
Ensures a network equipment has not been modified once labeled and stored
42
Access Control Vestibule (Mantrap)
An area between two doorways that holds people until they are identified and authenticated
43
Smart Locker
A fully integrated system that allows you to keep your laptop, tablet, smartphone, or other valuables inside
44
Asset Disposal
Occurs whenever a system is no longer needed by an organization Perform a factory reset Wipe the configuration Sanitize the devices
45
Factory Reset
Removes all customer specific data that has been added to a network device since the time it was shipped from the manufacturer
46
Data Remnants
Leftover pieces of data that may exist in the hard drive which we no longer need
47
Physical Environment
Computing equipment can be damaged by influencing the physical environment Temperature - Attacker disturbs the HVAC to overheat your systems Humidity - Create a high level of moisture/humidity Gas - Inject gas into an environment that could ignite