1. Network Security - CIA Triad & Attack Vectors | Terminology Set

0.0(0)
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/11

flashcard set

Earn XP

Description and Tags

Foundational security principles (Confidentiality, Integrity, Availability) and the four main attack vectors (Remote, Adjacent, Local, Physical) that classify how attackers approach their targets based on proximity and access.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

12 Terms

1
New cards

CIA triad

The foundational security framework consisting of Confidentiality, Integrity, and Availability.

2
New cards

Confidentiality

Keeping sensitive information private and preventing unauthorized access to data.

3
New cards

Integrity

Ensuring that data is not improperly modified or tampered with during storage or transmission.

4
New cards

Availability

Ensuring systems, services, and data are accessible to authorized users when needed.

5
New cards

Attack Vector

The method or pathway an attacker uses to gain unauthorized access to a network or system.

6
New cards

Remote (External) Attack Vector

Attacks executed from anywhere on the internet with no prior access required, targeting public-facing infrastructure.

7
New cards

Adjacent (Internal) Attack Vector

Attacks requiring the attacker to be on the same local network segment (LAN, Wi-Fi, VLAN) as the target.

8
New cards

Local Attack Vector

Attacks requiring some level of prior access to the target system, either via credentials or through user interaction.

9
New cards

Physical Attack Vector

Attacks requiring direct physical access to hardware components of a system.

10
New cards

DDoS (Distributed Denial of Service)

A remote attack that overwhelms services with traffic from many sources to make them unavailable.

11
New cards

Man-in-the-Middle (MITM)

An attack where the attacker secretly intercepts and possibly alters communications between two parties.

12
New cards

Multi-staged Intrusion

An attack that progresses through multiple phases: initial access, lateral movement, and privilege escalation.