Network Security Definitions Flashcards

(62 cards)

1
Q

Define Least Privilege.

A

The practice of granting users the minimum necessary access rights to perform their job duties, preventing excessive permissions and reducing security risks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Define Patch Management.

A

The systematic process of identifying software vulnerabilities or bugs and applying patches (fixes) to operating systems or applications to improve security and performance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Define Endpoint Security.

A

Network security method where local security measures on every device (or endpoint) connected to a network are implemented (ie like antivirus, firewalls, and intrusion detection).

Goal: To protect each endpoint from threats and prevent them from becoming entry points for attackers into the network.

This includes protections like antivirus software, authentication and authorization mechanisms, local firewalls, and intrusion detection/prevention systems installed directly on each device to safeguard it independently from the broader network security controls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Define Media access control (MAC) filtering.

A

A network security method that restricts access by allowing only devices with approved physical (MAC) addresses to connect.

MAC filtering works by creating a list of approved MAC addresses—these are unique hardware identifiers assigned to each network device (like your laptop or phone). The network’s access point (like a router or switch) checks the MAC address of any device trying to connect. If the device’s MAC address is on the approved list, it’s allowed access; if not, it’s blocked.

This method limits network access strictly to known devices, helping prevent unauthorized devices from connecting, even if they know the network password. However, MAC addresses can be spoofed, so MAC filtering is often used alongside other security measures for stronger protection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Define Virtual Private Network (VPN).

A

Network security method:

Encrypts communications over public networks to provide secure remote access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Define Network Isolation/Segmentation.

A

Network security method:

Separates network traffic into segments to limit access and contain breaches.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Define Firewalls.

A

Network security method:

Filter and monitor incoming/outgoing traffic based on rules to block malicious activity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Define Wi-Fi Protected Access (WPA).

A

Network security method:

Encrypts wireless network traffic to secure Wi-Fi connections.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Define System Hardening.

A

Network security method:

Reduces attack surfaces by closing unused ports, removing unnecessary services, and enforcing strict permissions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Define Access Controls.

A

Network security method:

Implement policies like least privilege, zero trust, and multifactor authentication to control who can access what.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Define Define Discretionary access control (DAC).

A

A security model where the data owner or creator has the authority to decide who can access their data or resources. The owner can grant or revoke permissions based on their own judgment, allowing them to control access flexibly.

In simple terms, with DAC, the person who owns the data gets to choose who else can see or use it, rather than having access controlled centrally by IT or based on fixed rules.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Define Policy-Based Access Control (PBAC).

A

Access control model that combines user roles with dynamic policies made up of rules to manage and evaluate user access in real time. It looks at various factors about a user—like their identity, role, clearance level, operational need, and risk—to decide what access they should have.

PBAC is more flexible than simple rule-based controls because it allows organizations to analyze and adjust theoretical privileges based on actual privileges users hold. This makes it ideal for growing organizations with changing policies and complex access needs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Define Role-Based Access Control (RBAC).

A

A model that assigns access permissions based on a user’s job role within an organization. Instead of giving permissions to individuals, access is grouped by roles, and users get the permissions associated with their role. This helps ensure proper separation of duties and makes managing access easier, especially when people change positions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Define Risk-Based Access Control (RBAC) .

A

An access control model that adjusts permissions based on the level of risk associated with the asset being accessed, the identity of the user, their intentions, and the security risk between the user and the system.

In practice:
- High-risk assets require stricter controls (like multifactor authentication).
- Low-risk assets might only need basic controls (like a password).
- Access decisions dynamically consider the potential impact on security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a Turnkey system?

A

A system that is customized for a particular application and is fully functional without additional development work. The expression of “turnkey” is derived from the idea that a user can just turn a key and the system will be fully functional.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is an Electronic lockbox?

A

A digital system that uses web addresses to receive and process electronic payments or forms, streamlining payment collection and processing for organizations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is an Electronic envelope?

A

A security mechanism that protects a message by combining data authentication and encryption to ensure confidentiality and integrity during transmission.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is a Digital Signature?

A

An encrypted electronic mark that verifies a message or document is from an authentic sender and hasn’t been altered. It uses a private key to sign and a public key to verify, ensuring authenticity and integrity but not controlling access or delivery.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is the difference between application-level programs and system-level systems?

A

Application-level programs serve users directly, while system-level programs control the computer’s fundamental operations.

Application-level programs:
User-focused software that performs specific tasks (e.g., browsers, word processors). They run on top of the operating system.

System-level programs:
Core software that manages hardware and system resources (e.g., operating system, device drivers). They operate closer to the hardware and support application programs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What does Need-to-Know mean as it relates to IT security?

A

Users are granted access only to the specific data or information necessary to perform their job tasks, limiting exposure to sensitive information. It focuses on restricting data access rather than broader system permissions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is the difference between Need-to-Know and Least Privilege?

A

Need-to-Know = DATA access control

Least Privilege = SYSTEM access control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is a circuit-level gateway?

A

A firewall that verifies the source of data packets at the session layer but does not share IP addresses among devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

A firewall that verifies the source of data packets at the session layer but does not share IP addresses among devices is called?

A

Circuit-level gateway

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is a network address translation firewall?

A

A device that allows multiple devices on a private network to share a single public IP address by masking their true private addresses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
A device that allows multiple devices on a private network to share a single public IP address by masking their true private addresses is called?
Network address translation firewall
26
What is an application-level gateway?
A firewall that inspects packets at the application layer but does not assign or share IP addresses among devices.
27
A firewall that inspects packets at the application layer but does not assign or share IP addresses among devices is called?
Application-level gateway
28
What is a software-defined wide-area network (SD-WAN) device?
A device that optimizes wide-area network connectivity using software but does not primarily share IP addresses among devices.
29
A device that optimizes wide-area network connectivity is called?
Software-defined wide-area network (SD-WAN) device
30
What is Tokenization?
Tokenization removes production data and replaces it with a surrogate value or token, which can be generated randomly, by hashing, or encryption, to protect sensitive data.
31
A method that replaces sensitive data with surrogate values to protect financial information during transactions. What is this called?
Tokenization
32
During the payment clearing process, a system replaces credit card numbers with random characters to secure the data. What method is being used?
Tokenization
33
What is Symmetric Encryption?
Symmetric encryption uses a single shared key for both encrypting and decrypting data within a group.
34
A method where the same key is used to encrypt and decrypt sensitive customer data, commonly used by banks. What is this called?
Symmetric Encryption
35
A bank encrypts customer data using one key and decrypts it with the same key to secure time-sensitive transactions. What method is this?
Symmetric Encryption
36
What is Asymmetric Encryption?
Asymmetric encryption uses a pair of keys—a public key to encrypt and a private key to decrypt, or vice versa—commonly used for digital signing and blockchain.
37
A cryptographic method that uses a public key for encryption and a private key for decryption, often used in digital signatures. What is this?
Asymmetric Encryption
38
When a company digitally signs a document using a private key and others verify it with a public key, which encryption method is being used?
Asymmetric Encryption
39
What is Masking?
Masking disguises part of the data by replacing it with other characters while maintaining the data’s original structure.
40
A technique that hides sensitive parts of data by replacing them with substitute characters but keeps the data format intact. What is this called?
Masking
41
A customer service rep sees only the last four digits of a credit card number while the rest are replaced with Xs. What data protection method is this?
Masking
42
Which of the six stages of a cyberattack this this describe? Attackers gather as much information as possible about the target IT system—like facility locations, network types, security measures, employee names, and management hierarchy. They also look for vulnerabilities such as open ports or unpatched software.
Reconnaissance
43
Which of the six stages of a cyberattack this this describe? Using the information collected, attackers exploit vulnerabilities to gain unauthorized access to the system.
Gaining Access
44
Which of the six stages of a cyberattack this this describe? Once inside, attackers try to increase their access level by obtaining credentials of users with higher privileges.
Escalation of Privileges
45
Which of the six stages of a cyberattack this this describe? Attackers establish ways to stay in the system undetected for a long time, often by creating backdoors or alternative access points.
Maintaining Access
46
Which of the six stages of a cyberattack this this describe? They carry out their objectives—stealing, modifying, or destroying data, disrupting operations, or disabling system access.
Network Exploitation and Exfiltration
47
Which of the six stages of a cyberattack this this describe? Attackers conceal their entry and exit points by disabling audit logs, clearing or modifying logs, and removing any files or traces they created to avoid detection.
Covering Tracks
48
What does zero-trust mean in terms of cybersecurity?
Zero trust means never trusting any user or device by default, assuming the network is always at risk. It requires continuous verification and authentication every time someone accesses the network or resources, not just once at login.
49
What is the process of controlling network traffic so that it is either inaccessible or separated from outside communications or other segments within an organization’s own network to improve overall network security?
Network segmentation
50
What is a comprehensive security approach that reduces risk by minimizing the number of access points (attack vectors) through which a company can be attacked, giving attackers fewer opportunities to infiltrate an IT system?
System hardening
51
What is service set identifier (SSID) broadcasting?
The process by which a wireless access point transmits the name of a wireless network within its range, making the network visible to nearby wireless-enabled devices. Disabling SSID broadcasting stops this transmission, making the network less visible and enhancing wireless network security by reducing the chance of unauthorized access.
52
What type of encryption does a VPN network use?
SYMMETRIC - Symmetric encryption uses a single shared key for both encrypting and decrypting data, which is ideal for the continuous data flow in VPN tunnels. - VPNs often establish the connection using asymmetric encryption initially (to securely exchange keys), but the actual data transmission relies on symmetric encryption for speed and efficiency.
53
What type of data integrity check does this describe? Verifies that the data entered matches predefined appropriate values or reference data (e.g., ensuring a general ledger account number exists in the master chart of accounts).
Validity Check
54
What type of data integrity check does this describe? Ensures that numeric data does not exceed predefined upper or lower ranges (e.g., quantity ordered cannot exceed 1000 units.
Limit Check
55
What type of data integrity check does this describe? Confirms that a numeric value falls within a specified range (e.g., date of birth must be between 1900 and current year).
Range Check
56
What type of data integrity check does this describe? Verifies that the data entered is of the correct type or format (e.g., numeric only, date format, text only).
Field Check
57
What are protocols?
Sets of rules that govern how information is transmitted between devices on a network. - They define the format, timing, sequencing, and error checking of data communication. - Protocols ensure that devices with different hardware and software can communicate effectively. - Examples include TCP/IP (the foundation of the internet), HTTP (for web browsing), and FTP (for file transfers). In short, protocols are like the agreed-upon "languages" and procedures that devices use to talk to each other on a network.
58
What is a network service?
A function or resource provided by a server or device on a network that supports communication, data sharing, or other network-related tasks for users or other devices. Examples include: - File sharing - Email services - Web hosting - Printing services - Domain name resolution (DNS) - Authentication and authorization services
59
What is the OSI process?
Process by which data travels through networks.
60
What is STRIDE?
A tool developed by Microsoft to help identify and assess security threats that can affect software applications and operating systems. It helps security teams think about different ways attackers might try to harm or exploit a system.
61
What is a Data Loss Prevention (DLP) tool and what are the 3 types?
A tool designed to detect and prevent unauthorized attempts to transfer or leak sensitive information outside an organization. It monitors data in motion, at rest, and in use across multiple protocols, ports, and communication methods. - Cloud-Based - Network-Based - Endpoint-Based
62
What is context-aware authentication?
A security technique that verifies a user's identity by considering additional contextual information beyond just a password or token. It uses data points such as: - The time of access - The geographic location of the user - The device or application used to access (e.g., desktop browser, mobile app) - The IP address or network location