Week 5 Flashcards

(19 cards)

1
Q

What is a Firewall?

A

A firewall is like a security guard for your computer or network. It controls what data can come in and go out, based on a set of rules. Can also act as VPN gateways.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Definition of DMZ (Demilitarized Zone):

A

A DMZ in networking is a small, isolated part of a network that adds an extra layer of security between the public internet and your private internal network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Purpose of DMZ?

A

Provides an additional layer of security by isolating external-facing services from the internal network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Components of DMZ?

A

1.External Firewall: Protects the network from unauthorized access from the internet.
2.Internal Firewall: Safeguards internal resources from potential threats originating in the DMZ.
3.Web Servers and Services: Hosts public-facing applications, websites, or services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Security Measures of DMZ?

A

-Access Control Lists (ACLs)
-Intrusion Prevention System (IPS)
-Logging and Monitoring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Advantages of DMZ:

A

-Enhanced Security: Segregation of services minimizes the risk of unauthorized access to sensitive data.
-Scalability: Easily accommodates the addition of new external services without compromising internal security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Types of Firewalls:

A

Based on Method of Delivery:
-Software firewalls
-Hardware firewalls
Based on Method of Operation:
-Packet filtering
-Circuit level
-Application level/Proxy level
-Stateful inspection
-Next Generation Firewalls (NGFW)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What Is Network Security?

A

Network security means protecting a computer network from unauthorized access, attacks, or damage.
A specialized field in cybersecurity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Common Network Security Threats?

A

Phishing
Cyberattack
Misconfiguration exploits
Denial-of-Service (DoS)
Malware
Ransomware
Rogue Security Software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Types of Network Security Solutions and Technologies?

A

-Firewalls
-Network Access Control (NAC)
-Remote Access VPN
-Network Segmentation
-Intrusion Prevention/Detection System (IPS/IDS)
-Zero Trust Network Access (ZTNA)
-Secure Access Service Edge (SASE)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Network Security Protocols:

A

-ensure the integrity and security of data transmitted across network connections.
-depends on the type of protected data and network connection.
-Safeguard against unauthorized or malicious efforts to access or remove information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

List of Some of the Network Security Protocols:

A

*Internet Protocol Security (IPsec) Protocols
*SSL (Secure Sockets Layer)
*TLS (Transport Layer Security)
*Datagram Transport Layer Security (DTLS)
*Kerberos (is a security system that helps computers and users prove who they are on a network)
*Simple Network Management Protocol (SNMP)
*HTTP and HTTPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

IPsec (Internet Protocol Security)

A

A set of protocols used to secure internet traffic by encrypting and authenticating data between devices over a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

SSL (Secure Sockets Layer)

A

A security protocol that encrypts the connection between a browser and a website to keep data safe, though now mostly replaced by TLS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

TLS (Transport Layer Security)

A

An improved version of SSL, used to secure communications between devices like web browsers and servers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

DTLS (Datagram Transport Layer Security)

A

A version of TLS designed to secure communications over unreliable networks, such as UDP

17
Q

SNMP (Simple Network Management Protocol)

A

A protocol used to manage and monitor network devices like routers and switches.

18
Q

HTTP and HTTPS:

A

HTTP (Hypertext Transfer Protocol) is used to transfer data between a web server and a browser, but it’s not secure.

HTTPS (Hypertext Transfer Protocol Secure) is the secure version of HTTP, where data is encrypted to prevent eavesdropping and tampering.

19
Q

SSL Vulnerability:

A
  • POODLE (Padding Oracle on Downgraded Legacy Encryption)
    *Heartbleed an OpenSSL cryptographic software library
    *BEAST (Browser Exploit Against SSL/TLS
    *CRIME (Compression Ratio Info-leak Made Easy)
    *RC4 Vulnerabilities