What is encryption?
The process of converting plaintext into ciphertext using a mathematical formula
Decryption requires running the data through the formula again with the same key.
What are the two main parts of encryption?
The complexity of the formula and the length of the key determine the strength of the encryption.
What types of data can be encrypted?
Different encryption types may be used for each type of data.
What does authentication guarantee in encryption?
Authentication guarantees that the data comes from a verified source and has not been tampered with during transmission
This ensures that the data comes from a verified source.
What is non-repudiation in the context of encryption?
Non-repudiation a critical component of network security, ensuring that a party involved in a digital transaction, or communication cannot deny the authenticity of their actions
It provides undeniable proof of the origin and integrity of data, preventing individuals from disavowing their participation in a communication or transaction.
What is the difference between symmetric and asymmetric encryption?
Symmetric encryption is faster, while asymmetric encryption allows for secure key sharing.
What is a key pair in asymmetric encryption?
The public key can be shared, while the private key must remain confidential.
What is Identity Access Management (IAM)?
IAM a cybersecurity framework that ensures the right individuals and systems have the appropriate access to digital resources at the right time and for the right reasons
It governs how users are identified, authenticated, authorized, and audited within an organization’s IT environment
What is the purpose of permissions management?
Permissions management determines user access to network resources
It specifies what users can view or change within the network.
What is geofencing?
Geofencing the use of location-based technology, such as GPS, RFID, Wi-Fi, or cellular data to create a virtual boundary around a specific geographic location
It can use GPS, Wi-Fi, or RFID to send notifications when users enter or exit a designated area.
What are bollards?
Bollards vertical posts typically made from materials such as metal, concrete, stone, wood, or plastic designed to serve as physical and visual barriers in various environments that block entry
They are pylons that can be temporary or permanent, and are placed strategically to prevent unauthorized access.
What is an access control vestibule?
Access control vestibule a secured entryway with two doors, each controlled by access systems. It prevents unauthorized access and is effective in high-security situations
Think of it as a buffer zone—a space between two secure areas where access is controlled but not necessarily interlocked
What is a mantrap?
Mantrap a A high-security interlock system with two interdependent doors; only one door can open at a time (interlocking mechanism)
Mantrap is like a security airlock—you must be fully authenticated and isolated before proceeding, and the system ensures only one person passes at a time.
What is the Common Access Card (CAC)?
CAC a DoD smart ID card used by military personnel, civilian employees, and eligible contractors to securely access physical facilities and DoD computer networks.
It contains personal identifiers and can be read by electronic card readers.
What is a honeypot?
A virtual trap designed to attract hackers
It helps understand hacker behaviors and techniques.
What is the difference between a honeypot and a honeynet?
Honeynets are used to gather more comprehensive data on attacker behavior.
What is the CIA triad in network security?
These are the core principles of information security.
What is risk in the context of information systems?
Risk is the potential for loss or damage when a threat exploits a vulnerability in a system,
It relates to compromising the confidentiality, integrity, or availability of information.
What factors determine the level of risk associated with an asset?
Risk level determined by:
If losing the asset has little effect, the risk is low; if it is vital, the risk is high.
An exploit is defined as what?
Exploit method of taking advantage of a vulnerability
Exploits can be apps or snippets of code designed to perform malicious acts on a vulnerable system.
What are two ways exploits can compromise systems?
Every operating system or application has some sort of vulnerability.
What is a zero-day exploit?
Zero-day exploit a cyberattack that targets a previously unknown software vulnerability—one that the vendor hasn’t had time to patch or even discover
These types of attacks are rare but can be complex and difficult to mitigate.
What is social engineering in the context of network security?
Social engineering is using human behavior against individuals to compromise a system
Training is vital to protect the network from social engineering attacks.
What does a threat refer to in information security?
An event that threatens to do harm
Harm can include unauthorized access, disruption, or damage to IT infrastructure.