S14-Network Security Fundamentals Flashcards

1
Q

What does the CIA Triad stand for?

A
  • Confidentiality
  • Integrity
  • Availability
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Confidentiality

A

Concerned with keeping data safe and private.
- Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Symmetric Encryption

A

Sender and Receiver use the same key for encryption and decryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Asymmetric Encryption

A

Sender and receiver use different keys for encryption and decryption: Public & Private keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

T/F Asymmetric encryption is faster than symmetric encryption

A

F, Symmetric encryption is almost 1000x faster than Asymmetric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the main problem with Symmetric encryption?

A

Key Management:
has challenges distributing keys at larger scales

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Public Key Infrastructure (PKI)

A

Encrypts information and facilitates key exchange using Asym. Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the difference between Symmetric and Asymmetric keys ?

A

Symmetric is fast and used for data transfer

Asymmetric is slow, but used for handshake and key exchange

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Integrity

A

Ensures data is not modified, and verifies the original source
- Hashing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Hashing

A

Uses an algorithm to convert data into a hash or hash digest that serves as a unique fingerprint for that data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Availability

A

Measures Data accessibility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Difference between Threats and Vulnerabilities

A

Threat : Attacker/ Attack
Vulnerability: Weak Point/ Weakness

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the 2 Types of Threats?

A
  • Internal Threats
  • External Threats
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Internal Threats

A

Threats from within the Organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

External Threats

A

Threats from without the Organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are some Types of Vulnerabilities?

A
  • Environmental
  • Physical
  • Operational
  • Technical
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Environmental Vulnerabilities

A

Undesirable factors and conditions in the area surrounding the building where the network is run

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Physical Vulnerabilities

A

Undesirable weaknesses and conditions in the buildings where a network is run

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Operational Vulnerabilities

A

Focuses on how the network and its systems are run from the perspective of an organization’s Policies and procedures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Technical Vulnerabilities

A

System-Specific Conditions that create a security Weakness

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Common Vulnerabilities and Exposures (CVE)

A

List of publicly disclosed computer security weaknesses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Zero-Day Vulnerability

A

Any weakness in the system design, Implementation, software code, or lack of preventive measures within a network that is unknown at the time of publication

23
Q

Exploit

A

Piece of software code that takes advantage of a security flaw

24
Q

Risk Management

A

Identification, Evaluation, and Prioritization of risks to minimize, monitor , and control the vulnerability exploited by a threat

25
Risk Assessment
Process that identifies potential hazards and their potential impact
26
What are 2 types of risk assessment?
- Security - Business
27
Security Risk assessment
Identify, assess, and implement security controls within an application, system, or network
28
Business Risk Assessment
Used to Identify, Understand, and Evaluate Potential Hazards in the workplace
29
Threat Assessment
Focused on identifying different threats that can attack or cause harm to systems and networks
30
What is the MITRE ATT&AK Framework?
a publicly available knowledge base that organizes and categorizes known cyber adversary behaviors, including tactics, techniques, and procedures (TTPs), used in cyberattacks
31
Vulnerability Assessment
Focused on identifying, quantifying, and prioritizing the risks and vulnerabilities in a system/network.
32
What are some Vulnerability scanners?
- Nessus - QualysGuard - OpenVAS
33
Penetration Test
Evaluates the security of an IT infrastructure by safely trying to exploit vulnerabilities within the systems/network
34
Posture Assessment
Used to Assess the organization's attack surface
35
What are the 4 main steps of a posture assessment?
- Define mission-critical components - Identify strengths, weaknesses , and security issues - Strengthen position - Stay in control
36
What are the 2 main types of business assessments?
- Process Assessment - Vendor Assessment
37
Process Assessment
Examination of processes used by the organization against a set of criteria
38
Vendor Assessment
Assessment of a prospective vendor to determine if they can effectively meet the obligations and the needs of the business
39
Data Locality
Geographic Location where data is stored and processed
40
Payment Card Industry Data Security Standard (PCI DSS)
Set of security standards designed to ensure that all companies that accept, Process, Store, or transmit credit card information maintain a secure environment.
41
General Data Protection Regulation (GDPR)
Regulation created by the European Union that focuses on data protection and privacy in the European Union and European Economic Area
42
Device Hardening
a cybersecurity practice that strengthens a device's security posture by reducing its vulnerability to attacks
43
What does Device Hardening involve?
configuring settings, disabling unnecessary features, and applying security measures to minimize potential exploits
44
What things are addressed when hardening a device?
- Patch Software - Configure Device - Remove unneeded Apps - Block unneeded Ports & Services - Control External Storage - Disable unneeded accounts - Rename Default accounts - Change default passwords
45
End of Life (EOL)
Date when a manufacturer will no longer sell a given product
46
End of Support (EOS)
Date when a manufacturer will no longer support a given product
47
Services
Background Apps that operate within the OS
48
Detection Method
Security control used during an event to find out if something malicious may have happened
49
Active Defense
Practice of responding to a threat by destroying or deceiving a threat actor's capabilities.
50
Honeypot
Host set up to lure attackers away from the actual network components
51
Attribution
Identification and publication of an attacker's methods, techniques, and tactics as useful threat intel
52
Annoyance Strategies
Rely on obfuscation techniques to annoy attackers
53
Examples of Annoyance strats
- Bogus DNS entries - Web servers with Decoy directories - Port triggering an Spoofing
54
Hack Back
Uses offensive or counterattacking techniques to identify the attacker and degrade their capabilities