Network Security Fundamentals Flashcards

(46 cards)

1
Q

Concerned with keeping data safe and private

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Both the sender and receiver use the exact same key encrypt/decrypt the message

A

Symmetric Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Symmetric encryption faces a key distribution challenge, requiring secure sharing of the key among users that need it

A

Key Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Two different keys are used to give confidentiality, one for the sender, and one for the receiver

A

Asymmetric Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Encrypts information and facilitates key exchange using asymmetric encryption like RSA

A

Public Key Infrastructure (PKI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Symmetric - Used for faster data transfer

Asymmetric - Used for handshake and key exchange

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Ensures that the data was not modified in storage or in transit, verifying the original source

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Running a string of data through an algorithm to create a hash or a hash digest that servers as a unique individual fingerprint for the data

A

Hashing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Matching of the has sent and the hash received means there was integrity in the transmission

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Measures data accessibility

A

Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Person or event that has the potential for impacting a valuable resource in a negative manner

A

Threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Quality or characteristic within a given resource or environment that might allow the threat to be realized

A

Vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Any threat that originates within the organization itself

A

Internal Threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Any threat that could be people, like a hacker, it can be an event or environmental ocndition

A

External Threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Undesirable conditions or weaknesses that are in the general area surrounding the building where a network is run

A

Environmental Vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Undesirable conditions or weaknesses in the buildings where a network is run

A

Physical Vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Focuses on how the network and its systems are run from the perspective of an organization’s policies and procedures

A

Operational Vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

System-specific conditions that create security weaknesses | CVE or Zero-day

A

Technical Vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

List of publicly disclosed computer security weaknesses

A

Common Vulnerabilities and Exposures (CVE)

20
Q

Any weakness in the system design, implementation, software code, or a lack of preventive mechanisms within a network that is unknown at the time of publication

A

Zero-Day Vulnerability

21
Q

CVE - Knwon vulnerabilities

Zero-Day - Brand new vulnerability

22
Q

Piece of software code that takes advantage of a security flaw or vulnerability within a system or network

23
Q

Identification, evaluation, and prioritization of risks to minimize, monitor, and control the vulnerability exploited by a threat

A

Risk Management

24
Q

Process that identifies potential hazards and analyzes what could happen if a hazard occurs

A

Risk Assessment

25
Used to identify, assess, and implement key security controls within an application, system, or network
Security Risk Assessment
26
Focused on the identification of the different threats to attack or cause harm to the systems or network
Threat Assessment
27
Focused on identifying, quantifying, and prioritizing the risks and vulnerabilities in a system or network
Vulnerability Assessment
28
Evaluates the security of a IT infrastructure by safely trying to exploit vulnerabilities within the system or network
Penetration Test
29
Used to assess the organization's attack surface | define mission-critical components, identify strengths, weaknesses, and security issues, strengthen position, stay in control
Posture Assessment
30
Used to identify, understand, and evaluate potential hazards in the workplace | Process Assessment & Vendor Assessment
Business Risk Assessment
31
Disciplined examination of the processes used by the organization against a set of criteria
Process Assessment
32
Assessment of a prospective vendor to determine if they can effectively meet the obligations and the need of the business
Vendor Assessment
33
Geographic location where data is stored and processed | focused on risk assessments & risk management
Data Locality
34
Set of security standards designed to ensure that all companies that accept, process, store, or transmit credit card information maintain a secure dnvironment
Payment Card Industry Data Security Standard (PCI DSS)
35
When designing an enterprise network, ensure that it is designed to segment and protect cardholder data environments
36
Regulation or law created by the European Union that is focused on data protection and privacy in the European Union and the European Economic Area
General Data Protection Regulation (GDPR)
37
Auditing and compliance is not a one-time activity, it is an ongoing process
- Monitoring and auditing program - Regular audits - PCI DSS & GDPR - Employee training - Policies and procedures
38
Ensures a device has had any unnecessary applications, services or ports disabled or removed from the host | only necessary services, monitoring software, maintenance schedule
Device Hardening
39
Device Hardening
1. Check any network interfaces that provide connectivity to the LAN or WAN 2. Look at the list of service installed and running on the clients and servers 3. Look at the ports being used by different application service ports 4. Utilize disk encryption to harden endpoints 5. Review all accounts on the system Anything unused or unneeded should be disabled, deleted or blocked Life cycle of a device - EOL & EOS
40
Practice or responding to a threat by destroying or deceiving a threat actor's capabilities
Active Defense
40
Relies on either a magnetic strip, a chip card, or RFID
Badge Reader
41
Host set up to lure attackers away from the actual network components
Honeypot
42
Entire network setup to entice attacker
Honeynet
43
Identification and publication of an attacker's methods, techniques, and tactics as useful threat intelligence
Attribution
44
Often rely on obfuscation techniques to annoy the attackers | Bogus DNS entries, web servers with decoy directories, port triggering and spoofing
Annoyance Strategies
45
Which of the following terms refers to a decoy computing system or network set up to lure attackers and gather information about their activities?
Honeynet