Network Security

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/34

flashcard set

Earn XP

Description and Tags

CIA Triad | Confidentiality, Integrity, Availability Confidentiality | Protecting data from unauthorized access Integrity | Ensuring data is accurate and not altered Availability | Ensuring systems/data are accessible when needed Encryption | Method to protect data by converting it into secure format Authentication | Verifying user identity Access Control | Restricting access to authorized users only Data Classification | Categorizing data based on sensitivity Integrity Protection | Using hashing, permissions, and audits to protect data Availability Threats | Natural disasters, hardware failure, cyber attacks Threat | Potential cause of harm to a system Risk | Likelihood and impact of a threat Risk Assessment | Identifying and evaluating risks Risk Register | Document that records risks and details Risk Score | Likelihood × Impact Risk Avoidance | Eliminating the risk completely Risk Acceptance | Accepting the risk knowingly Risk Mitigation | Reducing risk impact or likelihood Risk Transfer | Shifting risk to third party (insurance) Residual Risk | Remaining risk after controls applied Least Privilege | Giving minimum access required Admin Account Separation | Using separate admin and user accounts Separation of Duties | Dividing tasks to prevent fraud/errors Attack Surface | All possible entry points for attackers Application Attack Surface | Code, ports, inputs Network Attack Surface | Firewalls, network design Human Attack Surface | Social engineering, user mistakes Attack Surface Analysis | Identifying and reducing vulnerabilities Ingress Traffic | Incoming network traffic Egress Traffic | Outgoing network traffic Social Engineering | Manipulating people to gain access Phishing | Fake emails to steal information Identity Verification | Confirming legitimacy of request Security Awareness | Training users to prevent attacks Cost vs Security | Balance between cost and protection

Last updated 12:26 PM on 4/29/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

35 Terms

1
New cards

CIA Triad

The CIA Triad is a fundamental concept in information security, encapsulating three core principles: Confidentiality, Integrity, and Availability. These principles serve as a framework for developing security policies and practices in order to protect sensitive data and ensure reliable systems.

2
New cards

Confidentiality

Confidentiality ensures that sensitive information is accessible only to authorised users, employing methods like encryption and secure access controls.


3
New cards

Integrity | Ensuring data is accurate and not altered

Integrity means maintaining the accuracy and consistency of data, ensuring it is not improperly modified.

4
New cards

Availability | Ensuring systems/data are accessible when needed

Integrity means maintaining the accuracy and consistency of data, ensuring it is not improperly modified.


5
New cards
Encryption | Method to protect data by converting it into secure format
6
New cards
Authentication | Verifying user identity
7
New cards
Access Control | Restricting access to authorized users only
8
New cards
Data Classification | Categorizing data based on sensitivity
9
New cards
Integrity Protection | Using hashing, permissions, and audits to protect data
10
New cards
Availability Threats | Natural disasters, hardware failure, cyber attacks
11
New cards
Threat | Potential cause of harm to a system
12
New cards
Risk | Likelihood and impact of a threat
13
New cards
Risk Assessment | Identifying and evaluating risks
14
New cards
Risk Register | Document that records risks and details
15
New cards
Risk Score | Likelihood × Impact
16
New cards
Risk Avoidance | Eliminating the risk completely
17
New cards
Risk Acceptance | Accepting the risk knowingly
18
New cards
Risk Mitigation | Reducing risk impact or likelihood
19
New cards
Risk Transfer | Shifting risk to third party (insurance)
20
New cards
Residual Risk | Remaining risk after controls applied
21
New cards
Least Privilege | Giving minimum access required
22
New cards
Admin Account Separation | Using separate admin and user accounts
23
New cards
Separation of Duties | Dividing tasks to prevent fraud/errors
24
New cards
Attack Surface | All possible entry points for attackers
25
New cards
Application Attack Surface | Code, ports, inputs
26
New cards
Network Attack Surface | Firewalls, network design
27
New cards
Human Attack Surface | Social engineering, user mistakes
28
New cards
Attack Surface Analysis | Identifying and reducing vulnerabilities
29
New cards
Ingress Traffic | Incoming network traffic
30
New cards
Egress Traffic | Outgoing network traffic
31
New cards
Social Engineering | Manipulating people to gain access
32
New cards
Phishing | Fake emails to steal information
33
New cards
Identity Verification | Confirming legitimacy of request
34
New cards
Security Awareness | Training users to prevent attacks
35
New cards
Cost vs Security | Balance between cost and protection