Network Security Fundamentals Flashcards
(46 cards)
What is confidentiality in data security?
Ensures data privacy using encryption and authentication
Confidentiality is a fundamental principle in data security, safeguarding sensitive information from unauthorized access.
What is symmetric encryption?
Both sender and receiver use the same key for encryption and decryption
Symmetric encryption is faster but poses challenges for key management.
What is asymmetric encryption?
Involves a key pair: a public key known to everyone and a private key known only to the owner
Asymmetric encryption is commonly used for secure data exchange.
How does asymmetric encryption ensure confidentiality?
Sender uses the receiver’s public key to encrypt the data
This method allows secure communication without sharing private keys.
What is the key exchange process in secure communication?
- Client requests secure website using HTTPS
- Server provides public key with digital certificate
- Client encrypts random number with server’s public key and sends it back
- Server decrypts using its private key
- Both parties use the random number as a symmetric key for secure communication
This process establishes a secure session between the client and server.
What is data integrity?
Verifies data is not modified in transit or storage, preventing spoofing and unauthorized data changes
Data integrity is crucial for maintaining the accuracy and consistency of data.
What is hashing in the context of data security?
Algorithm creates a unique fingerprint for data, allowing verification of data integrity
Hashing is used to ensure that data has not been altered during transmission.
What does availability mean in data security?
Ensures data accessibility
Availability is essential for users to access information and services when needed.
How can availability be achieved?
Through redundant network design and components
Redundancy helps prevent downtime and ensures continuous service.
What are common threats to availability?
- Network floods
- Hardware failures
- Power outages
- Other disruptions
Understanding these threats is vital for implementing effective mitigation strategies.
What is a threat in the context of network security?
Person or event that has the potential to negatively impact valuable resources
Examples include hackers and natural disasters.
What is a vulnerability?
Weakness in system design, implementation, or lack of preventive mechanisms
Vulnerabilities can often be mitigated with proper security practices.
What is the risk in cybersecurity?
Occurs when a threat exploits a vulnerability
Understanding the interplay between threats and vulnerabilities is crucial for risk management.
What is an internal threat?
Originates from within the organization, such as malicious employees or unknowing end users
Internal threats can be harder to detect and mitigate.
What is an external threat?
Originates from outside the organization, such as hackers or environmental events
External threats often require different defense strategies compared to internal threats.
What are environmental vulnerabilities?
Weaknesses in the surrounding area affecting services, such as hurricanes or earthquakes
These vulnerabilities can impact infrastructure and service delivery.
What are physical vulnerabilities?
Weaknesses in the building infrastructure, such as unlocked doors or misconfigured systems
Physical security is critical for protecting assets.
What are operational vulnerabilities?
Weaknesses in policies and procedures, such as poorly enforced policies
Operational vulnerabilities can lead to security lapses.
What are technical vulnerabilities?
System-specific weaknesses, such as misconfigurations, outdated hardware, or malicious software
Regular updates and configurations are essential for minimizing technical vulnerabilities.
What is a Common Vulnerabilities and Exposures (CVE)?
List of publicly disclosed vulnerabilities – known vulnerabilities
CVEs provide details on vulnerabilities and affected software to help organizations manage risk.
What are zero-day vulnerabilities?
Newly discovered vulnerabilities exploited before a patch is available
Zero-day vulnerabilities represent a significant risk as they are often unknown to the software vendor.
What is an exploit?
Software code that takes advantage of a vulnerability
Exploits can lead to unauthorized access and data breaches.
What are key practices for prevention in cybersecurity?
- Keep systems updated with latest patches
- Use up-to-date anti-malware software
Regular maintenance and updates are crucial for security.
What is risk management?
Involves identifying, evaluating, and prioritizing risks
Aims to minimize, monitor, and control the probability or impact of vulnerabilities being exploited.