Network Security Fundamentals Flashcards

(46 cards)

1
Q

What is confidentiality in data security?

A

Ensures data privacy using encryption and authentication

Confidentiality is a fundamental principle in data security, safeguarding sensitive information from unauthorized access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is symmetric encryption?

A

Both sender and receiver use the same key for encryption and decryption

Symmetric encryption is faster but poses challenges for key management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is asymmetric encryption?

A

Involves a key pair: a public key known to everyone and a private key known only to the owner

Asymmetric encryption is commonly used for secure data exchange.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How does asymmetric encryption ensure confidentiality?

A

Sender uses the receiver’s public key to encrypt the data

This method allows secure communication without sharing private keys.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the key exchange process in secure communication?

A
  1. Client requests secure website using HTTPS
  2. Server provides public key with digital certificate
  3. Client encrypts random number with server’s public key and sends it back
  4. Server decrypts using its private key
  5. Both parties use the random number as a symmetric key for secure communication

This process establishes a secure session between the client and server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is data integrity?

A

Verifies data is not modified in transit or storage, preventing spoofing and unauthorized data changes

Data integrity is crucial for maintaining the accuracy and consistency of data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is hashing in the context of data security?

A

Algorithm creates a unique fingerprint for data, allowing verification of data integrity

Hashing is used to ensure that data has not been altered during transmission.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does availability mean in data security?

A

Ensures data accessibility

Availability is essential for users to access information and services when needed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How can availability be achieved?

A

Through redundant network design and components

Redundancy helps prevent downtime and ensures continuous service.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are common threats to availability?

A
  • Network floods
  • Hardware failures
  • Power outages
  • Other disruptions

Understanding these threats is vital for implementing effective mitigation strategies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a threat in the context of network security?

A

Person or event that has the potential to negatively impact valuable resources

Examples include hackers and natural disasters.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a vulnerability?

A

Weakness in system design, implementation, or lack of preventive mechanisms

Vulnerabilities can often be mitigated with proper security practices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the risk in cybersecurity?

A

Occurs when a threat exploits a vulnerability

Understanding the interplay between threats and vulnerabilities is crucial for risk management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is an internal threat?

A

Originates from within the organization, such as malicious employees or unknowing end users

Internal threats can be harder to detect and mitigate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is an external threat?

A

Originates from outside the organization, such as hackers or environmental events

External threats often require different defense strategies compared to internal threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are environmental vulnerabilities?

A

Weaknesses in the surrounding area affecting services, such as hurricanes or earthquakes

These vulnerabilities can impact infrastructure and service delivery.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What are physical vulnerabilities?

A

Weaknesses in the building infrastructure, such as unlocked doors or misconfigured systems

Physical security is critical for protecting assets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What are operational vulnerabilities?

A

Weaknesses in policies and procedures, such as poorly enforced policies

Operational vulnerabilities can lead to security lapses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What are technical vulnerabilities?

A

System-specific weaknesses, such as misconfigurations, outdated hardware, or malicious software

Regular updates and configurations are essential for minimizing technical vulnerabilities.

20
Q

What is a Common Vulnerabilities and Exposures (CVE)?

A

List of publicly disclosed vulnerabilities – known vulnerabilities

CVEs provide details on vulnerabilities and affected software to help organizations manage risk.

21
Q

What are zero-day vulnerabilities?

A

Newly discovered vulnerabilities exploited before a patch is available

Zero-day vulnerabilities represent a significant risk as they are often unknown to the software vendor.

22
Q

What is an exploit?

A

Software code that takes advantage of a vulnerability

Exploits can lead to unauthorized access and data breaches.

23
Q

What are key practices for prevention in cybersecurity?

A
  • Keep systems updated with latest patches
  • Use up-to-date anti-malware software

Regular maintenance and updates are crucial for security.

24
Q

What is risk management?

A

Involves identifying, evaluating, and prioritizing risks

Aims to minimize, monitor, and control the probability or impact of vulnerabilities being exploited.

25
What is a risk assessment?
Process to identify potential hazards and analyze their likelihood and consequences ## Footnote Determines an organization's tolerance for risks.
26
What is a security risk assessment?
Identifies, assesses, and implements key security controls within an application, system, or network ## Footnote This assessment is crucial for maintaining a secure environment.
27
What is the MITRE ATT&CK Framework?
A knowledge base of adversary tactics and techniques, derived from real-world observations ## Footnote Helps organizations understand threat methods and improve defenses.
28
What is a vulnerability assessment?
Identifies, quantifies, and prioritizes risks and vulnerabilities ## Footnote Typically uses vulnerability scanner tools such as Nessus or OpenVAS.
29
What is a penetration test?
Attempts to exploit vulnerabilities within the system or network for evaluation of IT infrastructure security ## Footnote Validates the effectiveness of defensive mechanisms.
30
What is a posture assessment?
Assesses an organization's attack surface to understand its cyber risk posture and exposure to threats ## Footnote Helps identify areas needing improvement in security.
31
What are the four main steps in a business risk assessment?
* Defining mission-critical components * Identifying strengths, weaknesses, and security issues * Strengthening security position * Staying in control ## Footnote This process ensures comprehensive risk management within an organization.
32
What is data locality?
Refers to geographic location where data is stored and processed ## Footnote Influenced by legal and regulatory requirements governing data protection.
33
What is the Payment Card Industry Data Security Standard (PCI DSS)?
Security standards for companies handling credit card information ## Footnote Not a law but a contractual requirement for handling cardholder data.
34
What is the General Data Protection Regulation (GDPR)?
European Union regulation focusing on data protection and privacy ## Footnote Applies to all organizations operating within the EU or offering goods/services to individuals inside the EU.
35
What are key practices for implementation and compliance?
* Implement continuous monitoring and auditing programs * Regular audits to ensure compliance with relevant standards and regulations * Employee training on auditing and compliance processes ## Footnote These practices help organizations meet legal obligations and maintain security.
36
What is device hardening?
Ensuring that a device has had any unnecessary application or port disabled or removed from the host ## Footnote Reducing the attack surface is crucial for improving security.
37
What are some key practices for device hardening?
* Run only necessary services * Install monitoring software for malware protection * Establish a maintenance schedule for system patching ## Footnote Device hardening applies to a variety of devices including endpoints and servers.
38
What is endpoint security software?
Install anti-malware, antivirus, spam filters, host-based firewalls, and log collection agents ## Footnote Enhances security posture and threat detection capabilities.
39
What is the importance of physical security in networking?
Protecting networking equipment is crucial to prevent unauthorized access and tampering ## Footnote Physical security measures are necessary to safeguard infrastructure.
40
What are detection mechanisms in security?
Security controls used during an event to find out whether something malicious has happened ## Footnote Examples include cameras and intrusion detection systems.
41
What are access control hardware types?
* Badge Readers * Biometric Readers * Access Control Vestibules ## Footnote These mechanisms control access to secure areas and enhance security.
42
What is active defense in cybersecurity?
Practice of responding to threats by destroying or deceiving the threat actor's capabilities ## Footnote Active defense involves proactive measures to counter threats.
43
What is a honeypot?
A host or server set up to attract attackers, allowing organizations to observe and learn from their attack methods ## Footnote Honeypots help organizations understand threat tactics.
44
What are annoyance strategies in active defense?
Use techniques like obfuscation to waste attackers' time and resources ## Footnote These strategies aim to frustrate and deter attackers.
45
What are the legal considerations of active defense strategies?
Active defense strategies, especially hack back, have significant legal implications ## Footnote Organizations must comply with local laws before engaging in such tactics.
46
PKI or Public Key Infrastructure
Encrypts info and facilities key exchange using asymmetric encryption like RSA