Network Security Fundamentals Flashcards

(10 cards)

1
Q

What is the CIA Triad?

A

Its an abreviation for the 3 most important things for security:
1. Confidentiality: Make sure only authorized users can access data
2. Integrity: Make sure the data is not tampered with.
3. Availability: Make sure the data and services are available at all times they are needed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Whats the difference between a threat and a vulnerability?

A

Threat: Person or event that has the potential for impacting an asset in a negative manner.

Vulnerability: Quality or characteristic (like a flaw in code), within an asset or environment, that could allow the threat to be realized.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a risk?

A

A threat, that can be realized due to a vulnerability, is a risk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the 4 types of vulnerabilities?

A
  • Environmental: Power Outage due to a hurricane
  • Physical: Open doors, missing CCTV allowing a threat actor to enter the building.
  • Operational: Bad or missing policies
  • Technical: Misconfigurations, Code Flaws, CVEs etc.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Whats the difference between a vulnerability and an exploit?

A

A vulnerability is just the weakness, that could be exploited, the Exploit is a piece of software (or sometimes just an action) that is used to exploit the vulnerability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a Risk Assessment?

A

A Risk Assessment determines possible incidents, their likelihood and consequences for the organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a Posture Assessment?

A

A Posture Assessment evaluates the attack surface of an organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Device Hardening?

A

Device Hardening is the process of reducing the attack surface of an device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are 6 basic steps for device hardening?

A
  1. Disable any unused network interfaces ones
  2. Remove any apps/services that arent needed to get the job done.
  3. Disable any ports that arent needed.
  4. Use full disk encryption
  5. Check account permissions.
  6. Keep the system updated
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are 3 “annoyance” defense techniques?

A
  • Bogus DNS entries
  • Web server with decoy entries
  • Port triggering & spoofing
How well did you know this?
1
Not at all
2
3
4
5
Perfectly