Operating Systems and Network Sec Course

0.0(0)
studied byStudied by 0 people
full-widthCall with Kai
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/98

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

99 Terms

1
New cards

Network Security

Having control of unwanted intrusion into communications on a network

2
New cards

Permission

authorization to access an asset

3
New cards

Privilege

The level of access a user/system has on a network

4
New cards

Confidentiality

Protecting data from unauthorized access

5
New cards

Integrity

Protection against unauthorized changes

Ensures data stays consistent

6
New cards

Authorization

The process of giving permission to a user to access certain functions on a system

7
New cards

Authentication

The process of verifying a user’s identity before granting access

8
New cards

Availability

The process of keeping a system running to avoid downtime

9
New cards

First Domain

User Domain

10
New cards

Second Domain

Workstation Domain

11
New cards

Third Domain

LAN Domain

12
New cards

Fourth Domain

LAN-to-WAN Domain

13
New cards

Fifth Domain

WAN Domain

14
New cards

Sixth Domain

Remote Access Domain

15
New cards

Seventh Domain

System/Application Domain

16
New cards

User Domain

The people (end users) who use IT systems and data

Risks: weak passwords, social engineering

17
New cards

Workstation Domain

Devices such as desktops and laptops where users interact with system

Risks: Malware, unauthorized software

18
New cards

LAN Domain

Internal networks that connects users and devices in one location

Risks: Unauthorized access, internal threats

19
New cards

LAN-to-WAN Domain

The point where the internal network connects to the internet (WAN)

Risks: external attacks, DDoS, malware from the web

20
New cards

WAN Domain

The broader external network including the internet

Risks: Data interception, DoS

21
New cards

Remote Access Domain

Access to the internal network from outside locations

Risks: Unsecure connections, stolen credentials

22
New cards

System/Application Domain

Includes servers, operating systems, and applications that store and process data

Risks: Unpatched software, misconfigurations

23
New cards

Auditors

Overlook a network to ensure everything is aligning with security policies

24
New cards

Van Eck Phreaking

Attack that listen on devices from afar

25
New cards

Defense in Depth

Strategy that uses multiple layered security controls to protect a network

26
New cards

Zero Day Exploits

New and unknown attacks that have no real defense mechanisms

27
New cards

Node

Any device on a network

28
New cards

MAC Address

48-bit hardware address

29
New cards

Hardening

The process of protecting a host from threats/attacks

30
New cards

Host

A form of node that has a logical address assigned to it

31
New cards

Firewall

Security device (hardware or software) that monitors and controls incoming and outgoing network traffic based on predefined security rules

32
New cards

Firewall Purpose

To block unauthorized access while still allowing legit communication on a network

33
New cards

Virtual Private Network (VPN)

A secure connection that encrypts data and creates a private tunnel between a user and network over the internet

34
New cards

VPN Purpose

To protect data from being intercepted 

35
New cards

Intrusion Detection System (IDS)

A security tool used to monitor a network system activity for malicious behavior or policy violations

36
New cards

IDS Purpose

To detect potential attacks

37
New cards

Intrusion Prevention System (IPS)

A security tool used to detect and block malicious activity in real time

38
New cards

IPS Purpose

To stop attacks before they cause damage

39
New cards

Encapsulation

The process of wrapping data inside a another protocol to protect data as it travels across the internet

40
New cards

Tunneling

The process of transmitting data securely through a public network by encapsulation it inside another protocol 

41
New cards

Proxy Servers

A server that sits between a user and the internet and forwards requests and responses on behalf of the user

42
New cards

Proxy Server Purpose

  • Hide the user’s IP address

  • Filter traffic

  • Improve security and performance

43
New cards

Network Address Translation (NAT)

A process used by routers to allow multiples devices on a private network to share one IP address

44
New cards

Static NAT

Maps one public IP address to one Private IP address permanently

45
New cards

Dynamic NAT

Maps private IP addresses to a pool of public IP addresses, dynamically assigned when needed

46
New cards

Port Address Translation (PAT)

Type of NAT that allows multiple devices on a private network to share one public IP address by assigning a unique port number to each connection

47
New cards

Domain Name System (DNS)

The translation of complex IP addresses into human-friendly domain names

48
New cards

DNS Spoofing

An attack that gives false DNS responses so a user is redirected to a malicious site

49
New cards

Network Access Control

A security tool used to control who and what can connect to a network by enforcing security policies

50
New cards

NAC Purpose

To ensure that only authorized devices can access the network

51
New cards

Hacking

Malicious intrusion/manipulation of computers

52
New cards

Breach

A successful attempt to get past a networks defense mechanisms

53
New cards

The Hacking Process

  1. Reconaissance

  2. Scanning

  3. Enumeration

  4. Attacking

54
New cards

Reconaissance Phase

The process of gathering as much information about a system as possible before launching an attack

55
New cards

Scanning Phase

The process of identifying live hosts and open ports on a network to discover potential vulnerabilities.

56
New cards

Enumeration Phase

The process of reviewing data from scanning to see if there is any vulnerability that can be exploited

57
New cards

Attacking Phase

The process of executing the actual exploit

58
New cards

Wardriving

Moving through an area on foot/car while scanning for wireless networks

59
New cards

Ping Sweeps

Technique that send ICMP echo requests across a range of IP addresses to find responding hosts

60
New cards

Port Scanning

Technique that monitor a host’s UDP/TCP ports to find the services that are listening and can be exploitable

61
New cards

Signature

string of code used to detect and identify specific malware

62
New cards

Malware

Unethical code hackers write to cause harm and destruction

63
New cards

Virus

Type of malware made to infect and replicate on a computer and networks by attaching itself to a host file

Goal: Replicates itself, spreads to other files/systems, disrupt normal operation, cause damage to data

64
New cards

Worms

Type of malware that self-replicates and spreads across networks without needing to attach itself to a host file or program

Goals: spread rapidly to multiple systems, cause harm, steal data

65
New cards

Keystroke Loggers

Type of malware that records every keystroke a user types on a device 

Goal: capture sensitive information (passwords, credit card number, usernames)

66
New cards

Spyware

Type of malware that secretly monitors and collect information from a user’s device

Goals: gather personal data

67
New cards

Adware

Type of malware that displays advertisements when the user is online

68
New cards

Trojan Horse

Type of malware that disguises itself as a real program to trick users to install it

Goal: provides unauthorized access to a system, install more malware, control system remotely

69
New cards

Logic Bomb

Malicious code intentionally inserted in software that stays quiet on a system until triggered

Goal: cause damage, sabotage, data deletion

70
New cards

Hijack Attack

Attack that disconnects one host in a active session and acts as the host to redirect/control traffic

71
New cards

SQL Injection

72
New cards

IPv6

Use 128-bit address space in hexadecimal format

Provides unlimited addresses

73
New cards

IPv4

Uses 32-bit address space in a decimal format

74
New cards

Addressing

The way devices are given unique identifiers so they can find and communicate with each other

75
New cards

Router Configuration

The process of setting up a router to control how devices connect to the internet and each other

76
New cards

Router

A device that connects devices to the internet and to each other

77
New cards

Encrypted Protocols

Ways to send data that no one else can read

Examples: HTTPS, SSL/TLS, SSH, VPN

78
New cards

Filtering

The process of controlling the flow of traffic to decide what is allowed or blocked 

79
New cards

Covert Channels

Pathways of communication that are hidden to avoid security systems

80
New cards

Types of IDS

  • Host based

  • Network based

81
New cards

Host Based IDS

Monitors and protects a single computer or device from suspicious activity

82
New cards

Network Based IDS

Monitors network traffic to detect malicious activity across many devices

83
New cards

Brute Force Attack

An attack where someone tries many passwords until they found the right one

84
New cards

Dictionary Password Attack

Attack that tries common words and phrases to guess the password

85
New cards

Multi-Factor Authentication

A security method that requires 2 or more ways to prove who you are before granting access

86
New cards

Multi-Factor Authentication Methods

  1. Something you know: password, PIN

  2. Something you have: key, code, ID

  3. Something you are: fingerprint, voice, face scan

87
New cards

Principle of Least Privilege

Grants users with enough access to only complete their job

88
New cards

Accounting

Logs and monitors the system’s environment to ensure compliance

89
New cards

Communication Encryption

The process of converting messages or data into a secret code to keep it secure

90
New cards

Data Encryption

The process of turning data into a code to protect it from unauthorized access

91
New cards

Redundancy

Extra or backup systems in place to keep things running if something fails

92
New cards

Redundancy Array or Independent Disks (RAID)

A way to store data across multiple hard drives to improve performance and protect against HD failure

93
New cards

RAID Levels

RAID 0 (Striping)

RAID 1 (Mirroring)

RAID 5 (Striping with (Parity)

RAID 10 (1+0)

94
New cards

Uninterruptible Power Supply (UPS)

Provides temporary power in case of blackout

95
New cards

Risk Assessment

The process of finding, analyzing and evaluating security risks to protect systems

96
New cards

Risk Management

The process of identifying, assessing, and controlling risks to reduce their impact

97
New cards

Zone Risks

A collection of networks that represent a level or risk

98
New cards
99
New cards