Network Security Fundamentals Flashcards
(95 cards)
What is the CIA Triad?
Confidentiality, Integrity, Availability.
What does Confidentiality ensure?
Data is kept private and secure from unauthorized access.
How is Confidentiality implemented?
Through encryption and authentication.
What is Symmetric Encryption?
Uses the same key for encryption and decryption.
Example of symmetric encryption?
AES.
Main challenge with symmetric encryption?
Key distribution.
What is Asymmetric Encryption?
Uses a key pair: public and private.
Example of asymmetric encryption?
RSA.
How does HTTPS use asymmetric encryption?
To exchange symmetric keys securely.
What does Integrity ensure?
Data has not been altered or tampered with.
How is Integrity enforced?
Hashing.
Example of hashing algorithms?
MD5, SHA-256.
What is Availability?
Ensuring data and services are accessible when needed.
How is Availability ensured?
Redundancy and high availability design.
Example threats to Availability?
DDoS, hardware failure, power outage.
What is a threat in cybersecurity?
A person, event, or condition with potential to cause harm.
What is a vulnerability?
A weakness that can be exploited by a threat.
When does risk exist?
When both a threat and a vulnerability are present.
Examples of internal threats?
Malicious employee, accidental actions by staff.
Examples of external threats?
Hackers, natural disasters.
Examples of environmental vulnerabilities?
Floods, power outages.
Examples of physical vulnerabilities?
Unlocked doors, poor cable management.
Examples of operational vulnerabilities?
Poor policies, lack of enforcement.
Examples of technical vulnerabilities?
Outdated software, misconfigured firewalls.