S14-Network Security Fundamentals Flashcards
What does the CIA Triad stand for?
- Confidentiality
- Integrity
- Availability
Confidentiality
Concerned with keeping data safe and private.
- Encryption
Symmetric Encryption
Sender and Receiver use the same key for encryption and decryption
Asymmetric Encryption
Sender and receiver use different keys for encryption and decryption: Public & Private keys
T/F Asymmetric encryption is faster than symmetric encryption
F, Symmetric encryption is almost 1000x faster than Asymmetric
What is the main problem with Symmetric encryption?
Key Management:
has challenges distributing keys at larger scales
Public Key Infrastructure (PKI)
Encrypts information and facilitates key exchange using Asym. Encryption
What is the difference between Symmetric and Asymmetric keys ?
Symmetric is fast and used for data transfer
Asymmetric is slow, but used for handshake and key exchange
Integrity
Ensures data is not modified, and verifies the original source
- Hashing
Hashing
Uses an algorithm to convert data into a hash or hash digest that serves as a unique fingerprint for that data
Availability
Measures Data accessibility
Difference between Threats and Vulnerabilities
Threat : Attacker/ Attack
Vulnerability: Weak Point/ Weakness
What are the 2 Types of Threats?
- Internal Threats
- External Threats
Internal Threats
Threats from within the Organization
External Threats
Threats from without the Organization
What are some Types of Vulnerabilities?
- Environmental
- Physical
- Operational
- Technical
Environmental Vulnerabilities
Undesirable factors and conditions in the area surrounding the building where the network is run
Physical Vulnerabilities
Undesirable weaknesses and conditions in the buildings where a network is run
Operational Vulnerabilities
Focuses on how the network and its systems are run from the perspective of an organization’s Policies and procedures
Technical Vulnerabilities
System-Specific Conditions that create a security Weakness
Common Vulnerabilities and Exposures (CVE)
List of publicly disclosed computer security weaknesses
Zero-Day Vulnerability
Any weakness in the system design, Implementation, software code, or lack of preventive measures within a network that is unknown at the time of publication
Exploit
Piece of software code that takes advantage of a security flaw
Risk Management
Identification, Evaluation, and Prioritization of risks to minimize, monitor , and control the vulnerability exploited by a threat