D315 Network and Security Foundations (trial)

0.0(0)
studied byStudied by 5 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/101

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

102 Terms

1
New cards

Computer Networking

A network of two or more computers connected by media with applications supporting information sharing, file sharing, hardware sharing, communication through email or IM, and VoIP for speaking.

2
New cards

Routers

Layer 3 devices forwarding data packets based on IP addresses, connecting different networks, containing CPU, memory, and I/O interfaces, and types like broadband, wireless, edge, subscriber edge, inter-provider border, and core routers.

3
New cards

Cable and DSL Modems

Hardware devices for connecting to remote networks or the internet, including dial-up modems, DSL modems for digital signal transfer, and cable modems for fast internet via coaxial cable TV lines.

4
New cards

Wireless Access Points (WAPs)

Special devices for WLAN, acting as bridges between wired and wireless networks, extending wireless range, and providing security through SSID, with rogue access points and evil twins posing threats.

5
New cards

Wireless Range Extenders

Devices extending radio frequency range, functioning at layer 1 of OSI model, lacking intelligence, and enabling connectivity beyond the normal range of WAPs.

6
New cards

Transmission Media

Copper, coaxial, and glass/fiber cables supporting data transmission, with characteristics, applications, and types like UTP, STP, and coaxial cables for various data networking needs.

7
New cards

Structured Wiring Systems

Modular cabling solutions supporting end-to-end connectivity, rapid changes, and high-speed bandwidth, with components like workstation outlets, wiring closets, and backbone distributions.

8
New cards

STP vs UTP

Comparison of Shielded Twisted Pair and Unshielded Twisted Pair cables in terms of noise reduction, data rates, installation challenges, and applications in different environments.

9
New cards

Optical Fiber Cabling

Data transmission using light pulses over long distances, highly secure and immune to EMI, with single-mode and multi-mode fiber options.

10
New cards

Network Topology

Layout of network devices like computers, printers, servers, and routers connecting through wired or wireless connections, with considerations for physical and logical topologies.

11
New cards

Logical Topography

Focuses on how the network operates and data transfer, emphasizing logical connections at the Data Link layer.

12
New cards

Network Topology

Describes the general organization of a network, including types like Ring, Bus, Star, Point-to-point, Mesh, and Hybrid/star wired bus.

13
New cards

Point-to-Point Networks

Directly connect computers or devices, based on time slots and polling for data transmission.

14
New cards

Bus Topology

Common linear network type with physical limitations on distance and device connections, requiring transceivers for communication.

15
New cards

Ring Topology

Token ring network where devices transmit with permission granted by a circulating token, preventing collisions.

16
New cards

Star Topology

All nodes directly connected to a central hub or computer in a star-wired configuration.

17
New cards

Wireless Ad Hoc Networks

Built as devices are added, allowing each device to connect to others, bypassing the need for a router.

18
New cards

Infrastructure Networks

Devices connect to a wired network using access points, scalable with multiple APs but more complex and costly to set up.

19
New cards

On-Premise Deployments

Exist within enterprise infrastructure, providing physical access but requiring high costs for hardware and software.

20
New cards

Cloud Deployments

Utilize off-site servers and software as a service, offering potential cost savings and accessibility from personal devices.

21
New cards

10Base-T

Represents 10 Mbps speed, uses base-band signaling, and employs twisted-pair cabling.

22
New cards

100Base-TX

Operates at 100 Mbps speed, utilizes base-band signaling, and incorporates twisted-pair cabling for full-duplex communication.

23
New cards

1000Base-SX

Achieves 1000 Mbps speed, employs base-band signaling, and utilizes short wavelength over fiber for full-duplex communication.

24
New cards

10GBase-SR

Provides 10 Gbps speed over fiber, uses baseband signaling, employs short wavelength extended range, and is supported by CAT-6a cabling.

25
New cards

40GBase-SR4

Offers 40 Gbps speed, uses base-band signaling typically in data centers, and employs SR4 for range and cabling identification.

26
New cards

100GBase-SR10

Delivers 100 Gbps speed, utilizes base-band signaling, and employs SR10 for cabling and range identification.

27
New cards

TCP/IP Model

Represents a 4-layer model, including the Application Layer, Transport to Host-to-Host Layer, Network or Internet Layer, and Physical or Network Access Layer, for network communication.

28
New cards

Virtualization

Involves abstracting physical components into logical objects, such as hardware resources like memory, storage, processors, and network connectivity, using a hypervisor for operation.

29
New cards

Hypervisors

Software that arbitrates resources between physical resources and virtual machines, with Type 1 running directly on server hardware and Type 2 running within a traditional OS.

30
New cards

Cloud Computing

Offers online resource management, accessibility, cost efficiency, and security benefits, but poses risks like security, privacy, migration issues, and vendor lock-in.

31
New cards

Cloud Service Models

Include Infrastructure as a Service (IaaS) providing on-demand access to infrastructure resources, and Platform as a Service (PaaS) offering development tools and services for efficient app coding and deployment.

32
New cards

Information Security

The collection of activities that protect the information system and data within it, including safeguarding privacy data, corporate intellectual property, and online transactions.

33
New cards

Network Security

Aims to protect data, network, hardware, and software, prevent unauthorized access, monitor malicious activities, and ensure the security of network assets during transactions and at rest.

34
New cards

Software as a Service (SaaS)

Software designed for end users, deployed, delivered, and accessed over the internet, characterized by vendor hosting, multi-platform support, and vendor-managed updates.

35
New cards

Risk Management

The formal approach to identifying, assessing, and prioritizing risks, followed by implementing strategies to mitigate or address these risks, involving elements like assets, vulnerabilities, threats, and safeguards.

36
New cards

Risk Assessment

Involves quantitative and qualitative methods to evaluate risks, with quantitative assessment determining financial impact and qualitative assessment focusing on assigning ratings to identified risks.

37
New cards

Risk Response Strategy

Involves planning responses to risks, including reduction, transfer, acceptance, or avoidance of negative risks, and exploiting, sharing, enhancing, or accepting positive risks.

38
New cards

Acceptable Range of Risk

Determines the level of risk that an organization is willing to accept, guiding the definition of activities and countermeasures to manage risks effectively.

39
New cards

Security Controls

Safeguards or countermeasures used by organizations to avoid, counteract, or minimize loss or system unavailability, implemented as part of the risk response plan.

40
New cards

Administrative Controls

Controls that develop and ensure compliance with policies and procedures in managing different phases of people processes.

41
New cards

Technical Controls

Controls carried out by a computer system to manage different phases of people processes.

42
New cards

Detective Controls

Controls that identify threats that have entered a system, like an Intrusion Detection System (IDS).

43
New cards

Preventative Controls

Controls that stop threats from coming into contact with vulnerabilities, such as Intrusion Prevention Systems (IPS).

44
New cards

Corrective Controls

Controls that reduce the effects of a threat, like reloading a malware-infected machine's OS.

45
New cards

Deterrent Control

Controls that deter actions that can result in violations, such as confirmation boxes after system changes.

46
New cards

Compensating Controls

Controls implemented to address threats without a straightforward risk-mitigating solution.

47
New cards

Countermeasures

Safeguards and actions taken to address risks, including fixing software flaws and providing encryption capability.

48
New cards

Risks, Threats, and Vulnerabilities

Risk is the probability of an event, threat can damage assets, and vulnerability is a weakness in design or code.

49
New cards

CIA Triad

Confidentiality secures data access, Integrity ensures data accuracy, and Availability ensures network accessibility.

50
New cards

Network Security Scope

The seven domains of IT infrastructure, including User, LAN, WAN, and Remote Access.

51
New cards

Threat Types

Major threat types include Disclosure threats, Alteration threats, and Denial or Destruction threats.

52
New cards

Malicious Attack

An attack exploiting vulnerabilities, consisting of fabrications, interceptions, interruptions, and modifications.

53
New cards

Attacker Types

Includes Hackers, Ethical Hackers, Black-hat hackers, White-hat hackers, and Gray-hat hackers.

54
New cards

TLS 1.3

Utilizes symmetric cryptography for secure data transmission

55
New cards

Network Risk

Probability of negative events like data breach or unauthorized access

56
New cards

Threat

Potential negative occurrences such as DoS attacks or man-in-the-middle attacks

57
New cards

Vulnerability

Weakness in network design like software bugs or security architecture flaws

58
New cards

Network Security Controls

Administrative, Physical, and Technical measures to mitigate risks

59
New cards

VLAN Hopping

Misconfigured VLAN allowing unauthorized access to other VLANs

60
New cards

Network Threats

Compromised Access Controls, De-authentication, DoS/DDoS attacks, etc.

61
New cards

Network Vulnerabilities

Weaknesses or flaws in an organizations software, hardware, or organizational processes that can result in a security breach.

62
New cards

Risk Assessment

Process involving identifying assets, risks, and evaluating likelihood of occurrences

63
New cards

Compliance Laws

FERPA, FISMA, GDPR, GLBA, HIPAA, and PCI DSS for specific security requirements

64
New cards

Security Controls

Administrative, Physical, and Technical safeguards to counteract security risks

65
New cards

Security Policies

Data handling, Password, Acceptable Use, Bring Your Own Device, and Privacy policies

66
New cards

Human Centered Design

Focuses on root issue, people, system interactions, and iterative prototyping

67
New cards

Least Privilege

Providing minimum rights necessary for tasks to limit exposure and access

68
New cards

Fail Safe

System should fail to a safe state during failures, handling errors and exceptions securely

69
New cards

Least Common Mechanism

A security principle to prevent unintentional sharing of information and eliminate potential pathways for secret sharing.

70
New cards

Firewalls

Security devices that control traffic flow, prevent unauthorized network traffic, and offer filtering features like flood guard, loop protection, and network segmentation.

71
New cards

Firewall types

Stateful Inspection, Packet Filtering, Border, Application

72
New cards

Packet Filtering Firewall

Basic firewall type that compares traffic with rules for each packet passing through.

73
New cards

Stateful Inspection Firewall

Firewall that remembers communication status and checks rules only for new sessions.

74
New cards

Application Firewall

Firewall that acts as a proxy between systems, not allowing direct packet travel.

75
New cards

Border Firewalls

Basic approach separating the network from the internet, normally sits behind router and receives all communications passing from the private network to the internet

76
New cards

Screened Subnet

Used when it isn’t possible to block all traffic into a network, like from a public website or email server. Creates a special network called a demilitarized zone (DMZ)

77
New cards

Multilayered Firewall

Suitable for networks with different security levels.

78
New cards

Unified Threat management

Provides filtering and additional security services like URL and content inspection, and malware detection.

79
New cards

IDS/IPS

Intrusion Detection Systems (IDS) and Intrusion Protection Systems (IPS) that can be network-based (NIDS/NIPS) or host-based (HIDS/HIPS) and work through signatures and heuristics.

80
New cards

Encryption Techniques and Methods

Scrambles data using keys for encryption and decryption, with symmetric (AES, DES) and asymmetric (RSA, Diffie-hellman) encryption methods.

81
New cards

Device Hardware Hardening

Involves risk management, mitigation, and securing the network through centralized devices, dedicated countermeasures, and least privilege policies.

82
New cards

Defense in Depth

Security approach with layered controls to protect data, applications, and networks, including people security, physical security, network security, and data security layers.

83
New cards

IT Security Policy Framework

Consists of policies, standards, procedures, and guidelines to reduce risks, with components like policy, standard, procedures, and guidelines.

84
New cards

Risk Mitigation Strategies

Aim to reduce the likelihood or impact of threats based on risk appetite and tolerance, using risk-based methodologies and risk profiles to understand and manage risks.

85
New cards

Risk Appetite Types

Different levels of willingness to take risks, including risk averse, minimal, cautious, open, and hungry.

86
New cards

Security Risk Assessments

Processes to identify, assess, and implement security measures, focusing on preventing vulnerabilities and exploits, integral to an organization's risk management.

87
New cards

Data Classification Standards

Categorizing data into private, confidential, internal use only, and public-domain data, each requiring specific security controls.

88
New cards

Access Control Models

Different methods like DAC, RBAC, ABAC, RuBAC, and CBAC to manage and restrict access to resources based on roles, attributes, or rules.

89
New cards

Encryption

Using cryptography to transform data into unreadable forms for unauthorized users, securing data in passive, in process, or in transit states.

90
New cards

Security Operations and Administration

Involves security administration, access control, documentation, compliance, disaster recovery, and outsourcing considerations to ensure effective security management.

91
New cards

Professional Ethics

Upholding ethical guidelines, codes of ethics, and professional requirements to maintain professionalism and integrity in security practices.

92
New cards

Personnel Security Principles

Strategies like least privilege, separation of duties, job rotation, mandatory vacations, security training, and awareness to mitigate risks associated with human factors in security.

93
New cards

Baselines

Basic configurations for devices and services documented to ensure uniform operation.

94
New cards

Data Classification Standards

Assigns specific classifications based on data value, sensitivity, and criticality.

95
New cards

Information Classification Objectives

Identifies protection requirements, data value, and ensures appropriate protection.

96
New cards

Classification Procedures

Determines data handling based on data value criteria and includes assurance and configuration management.

97
New cards

Change Management Process

Involves configuration controls and change control to manage system changes securely.

98
New cards

Application Software Security

Involves System Life Cycle (SLC) and System Development Life Cycle (SDLC) for secure software development.

99
New cards

Testing application software

Ensures thorough testing for expected and unexpected events.

100
New cards

Systems procurement

Involves evaluating new software and hardware, monitoring contracts, and following procurement procedures.