Network Security Concepts

0.0(0)
studied byStudied by 0 people
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/36

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

37 Terms

1
New cards

CIA Triad

Confidentiality, Integrity, and Availability

2
New cards

Confidentiality

  • Access Controls: Mechanisms such as passwords, biometric verification, or access cards that limit resource access to authorized personnel

  • Encryption

  • Secure Communication: Using secure protocols like SSl/TLS for transmitting data to prevent interception by unauthorized entities

3
New cards

Integrity

Protecting data from unauthorized changes to ensure that it is reliable and correct. Key aspects:

  • Data accuracy

  • Data consistency

  • Data trustworthiness

Various methods are used, such as Cryptographic hash functions and digital signatures, Access controls as well

4
New cards

Availability

Ensuring data, systems, and services are accessible to authorized users when needed. Ways to do so:

  • Fault tolerance

  • Backup Systems

5
New cards

Risk

Asset: Anything within an environment that should be protected

Asset Valuation: A dollar value assigned to an asset based on actual cost and non-monetary expenses

Threats: Any potential occurrence that may harm the asset

Threat Agent/Actors: People, programs, hardware, or systems that used threats to cause harm

Threat events

Threat Vectors: A threat/attack vector is the path or means by which an attack/attacker can gain access to a target in order to cause harm

Vulnerabilities: Weakness in an asset or the absence or the weakness of a safeguard or countermeasure that could be exploited

Exposure: Actual or anticipated damage from a threat

Safeguards: Anything that removes/reduces risk

Attack: The threat exploiting the vulnerability, (the attempt to attack/exploit it)

Breach: The occurrence of a security mechanism being bypassed or thwarted by a threat agent (a successful attack)

6
New cards

Identity and Access Management (IAM)

A framework of business processes, policies, and technologies that facilitates the management of electronic or digital identities. Ensures the right people can access the right resources at the right times for the right reasons. Crucial for security and regulatory compliance

7
New cards

MAC (Mandatory Access Controls)

A security model in which access rights are regulated by a central authority based on different levels of security clearance. Use case: Common in government and military systems where classified info is involved.

Key aspect: Users cannot change access permissions… they are set and enforced by a system admin

8
New cards

DAC (Discretionary Access Control)

Security model where the resource owner decides on access levels. Most flexible access model. Used in environments where users need control over the resources they own, like file permissions etc.

Key aspect: Risk of users granting excessive access potentially leading to security breaches

9
New cards

RBAC (Role Based Access Control)

Assigns permissions based on a user’s role in an organization. Common in corporate environments. Streamlines access management

10
New cards

Rule Based Access Control

Access decisions are based on a set of rules defined by a system admin. Useful in environments requiring stringent access control, like securing network resources.

Key aspect: Rules can be based on various criteria, such as source/destination IP in firewalls

11
New cards

Attribute-Based Access Control (ABAC)

Uses policies that evaluate attributes of users, the environment, and resources. Effective in complex environments with diverse and dynamic user attributes.

Key aspect: Provides fine-grained control, allowing for more nuanced access decisions based on multiple factors (like access based on location, time, browser you use, etc)

12
New cards

SSO Importance

  • Reduced password fatigue

  • Centralized Authentication Control (Easier to enforce security policies)

  • Reduced IT workload (Simplified management of user accounts)

13
New cards

LDAP

Protocol for accessing and maintaining distributed directory information services, like user and group details, over a IP network

14
New cards

Federation

The process of linking and managing identities/credentials across different systems and organizational boundaries (SSO for multiple sites/apps/websites)

15
New cards

SAML

Security Assertion Markup Language, an open standard for exchanging authentication and authorization data between parties, specifically between an identity provider and a service provider. Very popular for federation

Usage: Widely used for SSO to allow users to log in to multiple applications with one set of credentials

Uses XML for data exchange. Particularly useful in enterprise-level SSO

Key Components:

  • Identity Providers (IdPs): Services that authenticate users and provide identity information to service providers. Examples: Okta, Microsoft Azure AD, and Google Identity. Attestation (formal verification that something is true) is done with the IdPs.

  • Service Providers: The applications or services that rely on information from the IdP to provide access to the user (like Best Buy, Facebook, New sites, etc)

<p>Security Assertion Markup Language, an open standard for exchanging authentication and authorization data between parties, specifically <strong>between an identity provider and a service provider</strong>. Very popular for federation</p><p>Usage: Widely used for SSO to allow users to log in to multiple applications with one set of credentials</p><p>Uses XML for data exchange. Particularly useful in enterprise-level SSO</p><p>Key Components:</p><ul><li><p><strong>Identity Providers (IdPs): </strong>Services that <strong>authenticate users</strong> and provide identity information to service providers. Examples: Okta, Microsoft Azure AD, and Google Identity. <u>Attestation</u> (formal verification that something is true) is done with the IdPs.</p></li><li><p><strong>Service Providers: </strong>The applications or services that rely on information from the IdP to provide access to the user (like Best Buy, Facebook, New sites, etc)</p></li></ul><p></p>
16
New cards

OAuth

Open standard for access delegation. Used to grant websites or applications access to their information on other websites but without giving them the passwords. Commonly used for authorizing third-party applications to access a user’s data without exposing their credentials.

Is about authorization not authentication, and is used to grant limited access on behalf of the user

17
New cards

OpenID Conect

An identity layer on top of OAuth 2.0. Allows clients to verify the identity of the end-user based on authentication performed by an authorization server. Primarily used for authentication in modern web applications and mobile applications

18
New cards

Geofencing

Limiting access to resources (using GPS, RFID, WiFi, or cellular data) based on location, using either a mobile device or RFID tag for instance.

19
New cards

Deception and Disruption Technology

Refers to a set of cybersecurity strategies/tools designed to mislead, confuse, or disrupt the actions of malicious actors. used to create traps or illusions that protect real network assets by diverting attackers to decoy systems/files

20
New cards

Honeypot

A security mechanism setup to detect, deflect, or study hacking attempts. Acts as a decoy, imitating a real computer system, network, or information system, but is isolated and monitored. Provides valuable info about their techniques/intentions without endangering the actual network

21
New cards

Honeynet

A network of honeypots. Simulates a network environment to attract attackers. More complex, but can provide deeper insights

22
New cards

Honeyfiles

Decoy files placed with an network’s file systems. Appears legitimate and contains attractive data, but are monitored for access. Unauthorized access can alert security personnel

23
New cards

Honeytoken

Any decoy data or token inserted into a system. Could be a fake user account, database record, or any other type of digital bait that when interacted with indicates a compromise or unauthorized access

24
New cards

Data locality

Refers to the geographical location where data is stored, processed, and managed. Compliance with data locality regulations ensures that data handling practices meet regional legal requirements

25
New cards

PCI DSS

Payment Card Industry and Data Security Standards. Involves implementing encryption, access control, and regular monitoring to protect cardholder data from breaches and fraud

26
New cards

GDPR

General Data Protection Regulation. Comprehensive data protection regulation that governs the processing of personal data with the EU and beyond. Has strict requirements on organizations, including obtaining consent for data collection (like cookies), ensuring data accuracy, implementing security measures, and providing individuals with rights over their data

27
New cards

Way to reduce security risks from BYODs?

Segment them onto a separate network

28
New cards

ICS

Industrial Control Systems, general term for systems in industrial production (gas, electrical, water, etc). Ran on the SCADA protocol, distributed control systems (DCS) and other smaller control system configurations such as PLC (programmable logic controllers)

29
New cards

IoT Safety/Security

  • Password Management

  • Updates

  • Network segmentation

30
New cards

Ciphertext

The encrypted version of data that requires the cryptographic key to decrypt

31
New cards

Encryption of Data in Transit

Data be transferred over a network. Protects it from interception/tampering. Common protocols: HTTPS, SSL/TLS, and VPN

32
New cards

Goals of Cryptography

  • Confidentiality: Converting plaintext to ciphertext and back again with the decryption key

  • Integrity: Guaranteeing that data is protected from unauthorized or accidental changes. Cryptographic hash functions, for example, are used to produce a unique hash value for data, that can be used to verify the data hasn’t been altered

  • Authentication: Verifying the identity of a user, device, or entity in a communication process. For example, digital certificates are cryptographic techniques that can be used to confirm the identity of the parties involved in a communication. Passwords are another

  • Non-repudiation: Preventing an entity from denying their involvement in a transaction or activity. Digital signatures ensure that once a party signs a document or message, they can’t later claim they didn’t

33
New cards

Symmetric Encryption

Uses the same key for encryption and decryption (secret/private key cryptography)

Key sharing: Since the same key is used for both, it must be shared and kept secret between parties. Securely distributing and managing this key is crucial for symmetric encryption

Speed and Efficiency: Generally faster and more efficient than asymmetric, suitable for large amounts of data

Applications: Used in various applications like encrypting data in secure storage, data in transit, and encrypting files and databases

Security: Strength depends on the key length

Key Challenges:

Key Management

Scalability issues: For N users to communicate securely with each other, N(N-1)/2 unique key pairs are needed. This exponential growth can make key management impractical in large systems or networks

Key Storage and Protection: If a key is stolen or exposed, an attacker can decrypt any data encrypted with that key. Becomes more complex as the number of users increases

Lack of Non-repudiation: Can’t determine which specific user performed an encryption or decryption, which is a drawback in scenarios where proof of authorship is important

34
New cards

Asymmetric Encryption

AKA Public Key Cryptography. Uses pairs of keys: a public key, which can be shared by anyone, and a private key, which is known only to the owner

Process:

  • Encryption: Sender encrypts the data using the recipient’s public key. Once encrypted, the data can only be decrypted by the associated private key.

  • Decryption: Recipient uses their private key to decrypt the data.

Advantages:

  • Solves the key distribution problem

  • Provides a method for digital signatures, important for authentication and non-repudiation

Disadvantages:

  • More computationally intensive than symmetric encryption, making it slower for large amounts of data

  • Requires careful management of the private key, if the private key is compromised, so is the security of the system

35
New cards

PKI

Public Key Infrastructure. Framework used to create, manage, distribute, use, store, and revoke digital certificates and manage public key encryption. Purpose is to facilitate the secure electronic transfer of information for a range of network activities, like e-commerce, internet banking, and confidential email

Functioning of PKI:

  • Encryption/Decryption: Allows users to encrypt and decrypt data using public and private keys

  • Digital Signatures: Provides for creation and verification of digital signatures, ensuring the authenticity and integrity of the data

  • Certificate Management: The CA issues/revokes certificates as needed.

TLS (HTTPS/FTP/etc) utilizes PKI to function

Utilizes hybrid-cryptography

36
New cards

PKI (Cont)

X.509 Digital Certificate format.

  • CRL Distribution Point: An attribute telling if a certificate has been revoked

Certificate Types:

  • CA Certificate: Grants organization ability to be a certificate authority

  • End Entity Certificates:

    • Domain Validation (DV) is issued if control of a domain is proven

    • Extended Validation (EV) is a higher level assurance if the CA can verify that the applicant is a legitimate business

  • Wildcard Certificates:

    • Type of digital certificate used in SSL/TLS encryption, typically for securing websites

    • Versatile SSL certificate that allows multiple subdomains of a single domain to be secured with one certificate

37
New cards

Self Signed vs Third-Party

Third Party (CA Signed Certificates):

  • Issued and signed by a trusted CA. CA verifies the identity of the entity

  • Trust level: High. Central to most secure internet communications, like HTTPS

  • Widely used on the public internet for websites, email servers, and other public facing services where establishing trust with end users is crucial.

  • Typically involves a cost

Self Signed:

  • Created and signed by the entity it represents, rather than by a trusted third-party CA

  • Not inherently trusted, since there’s no independent verification

  • Often used in test environments, internal networks, or applications where the users can reliably verify the certificate’s authenticity without needing an external CA, or in situations where the overhead of obtaining a CA signed certificate isn’t justified

  • Zero cost