1/14
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
|---|
No study sessions yet.
CIA Triad
Confidentiality - Protecting data from unauthorized access
Types of Security Controls
Physical Controls - Fencing, locks, cameras, access cards
Control Purposes
Preventative - Stop incidents (password requirements, firewalls)
Common Vulnerability Categories
Environmental issues (power loss, temperature, humidity)
Environmental Controls
UPS / generators for power
Virtual Machines (VMs)
Provide isolated sandboxes for testing untrusted software safely
Physical Security
Use layered protection: fencing, cameras, guards
MAC Spoofing
Attacker impersonates another device's MAC address
MAC Flooding
Overloads CAM table → switch broadcasts all frames
Signs of MAC Flooding
Unknown MACs, rapid MAC changes, multiple MACs on one port
Port Security Measures
Limit number of MAC addresses per port
Firewall Types
Host-based - Protect a single device
Why Segment a Network?
Improves security by isolating sensitive devices
VLANs (Virtual Local Area Networks)
Logically group devices into separate LAN segments
Creating VLANs
Identify network segmentation needs