This class was created by Brainscape user Elsa N. Visit their profile to learn more about the creator.

Decks in this class (18)

Introduction to Network Security
Computer security vs network secu...,
What are some network security ob...,
How can we ensure confidentiality
10  cards
Network Terms
What is a datagram,
What is a channel,
What is a session
9  cards
Network Security Threats and Attacks
What is ip spoofing,
In what 4 broad categories are th...,
What are some threats to network ...
9  cards
Chapter 1: Introduction
What is the definition of compute...,
What are two terms related to con...,
What are two terms related to int...
6  cards
Chapter 1: X.800 Security Services
What does it say about authentica...,
What does it say about access con...,
What does it say about data confi...
5  cards
Chapter 1: X.800 Security Mechanisms
What is specific security mechanisms,
What are the different specific s...,
What is pervasive security mechan...
10  cards
Chapter 1: Attack Surfaces and Attack Trees
What is an attack surface,
What 3 categories can attack surf...,
What is the purpose of an attack ...
6  cards
OSI and TCP/IP Model
What are the 7 layers of the osi ...,
What are the 4 layers of the tcp ...,
What are the major functions at e...
12  cards
Types of Spoofing attacks
What is arp spoofing and what cou...,
What is router spoofing and how c...,
What is ip spoofing and what coun...
3  cards
Chapter 2: Symmetric Encryption
What are the two requirements for...,
What are the different types of a...,
What criteria does a computationa...
5  cards
Chapter 2: Random and Pseudorandom Numbers
What are random numbers used for ...,
What two criteria are used to val...,
How can you determine if a random...
8  cards
Chapter 2: Stream and Block Ciphers
What is a block cipher vs a strea...,
What is the rc4 algorithm,
How does the rc4 work
4  cards
Chapter 3: Message Authentication and Public-Key Cryptography
Message authentication and public-key cryptograhpy
17  cards
Chapter 4: Key Distribution and User Authentication
Key Distribution and User Authentication
17  cards
Chapter 5: Network Access Control and Cloud Security
What does network access control ...,
W,
What are 4 common nac enforcement...
13  cards
Chapter 6: Transport-Level Security
Transport-Level Security
36  cards
Chapter 7: Wireless Network Security
Wireless Network Security
44  cards
Chapter 9: IP Security
What three functional areas does ...,
What is the principal feature of ...,
What are some benefits of ipsec
28  cards

More about
NetSec

  • Class purpose General learning

Learn faster with Brainscape on your web, iPhone, or Android device. Study Elsa N's NetSec flashcards now!

How studying works.

Brainscape's adaptive web mobile flashcards system will drill you on your weaknesses, using a pattern guaranteed to help you learn more in less time.

Add your own flashcards.

Either request "Edit" access from the author, or make a copy of the class to edit as your own. And you can always create a totally new class of your own too!

What's Brainscape anyway?

Brainscape is a digital flashcards platform where you can find, create, share, and study any subject on the planet.

We use an adaptive study algorithm that is proven to help you learn faster and remember longer....

Looking for something else?

Make Flashcards