Networking 4.1 Network Security

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/34

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

35 Terms

1
New cards

Is any information actively traveling across a network, whether wired or wireless. Because it moves between devices, it’s vulnerable to interception, so encryption like TLS or IPsec is used to protect it.

Data in Transit

2
New cards

Information stored on disks, databases, or storage systems. Since it isn’t moving, security focuses on encryption and access controls to prevent unauthorized access.

A: Important files locked inside a filing cabinet.

Data at Rest

3
New cards

The system that creates, manages, and trusts digital certificates and encryption keys. It allows users and devices to verify identities securely across a network.

A: A trusted ID office that issues verified IDs.

PKI (Public Key Infrastructure)

4
New cards

Controls who can access systems, data, and resources. It ensures users are authenticated, authorized, and monitored when accessing information.

A: Security badges deciding who can enter which rooms.

IAM (Identity and Access Management)

5
New cards

Users only get the access they need to do their job — nothing more. This reduces damage if an account is compromised.

A: Giving someone only the keys they actually need.

Least Privilege

6
New cards

Assigns permissions based on job roles instead of individuals. Users inherit access based on their role in the organization.

A: Job titles determine which doors open.

RBAC (Role-Based Access Control)

7
New cards

Restricts access based on physical location. Users may gain or lose access depending on where they connect from.

Geofencing

8
New cards

Is a digital certificate created and signed by the same entity using it. It encrypts traffic, but it is not trusted by default because no third-party Certificate Authority (CA) verifies it.

A: It’s like writing your own ID card. It proves who you say you are, but others don’t automatically trust it.

Self-signed certificate

9
New cards

It is the process of proving you are really who you say you are. This is done using private information like a password, MFA code, biometric, or token.

Authentication

10
New cards

Determines what resources you are allowed to access after authentication. Permissions are based on your role, account, or group membership.

Authorization

11
New cards

Records user activity such as logins, logouts, failed attempts, and actions performed. This is used for auditing, security, and troubleshooting.

A:Security cameras and entry logs tracking movement.

Accounting

12
New cards

A ____ Server stores credentials and validates authentication requests. Devices like VPNs, firewalls, and Wi-Fi controllers send login requests to the server for approval.

AAA

13
New cards

Allows users to authenticate once and access multiple systems without logging in again for a set period of time (often 24 hours).It is what the user experiences.

Single Sign-On (SSO)

14
New cards

It is a widely used authentication protocol that allows devices to communicate with a AAA server. Commonly used for VPNs, Wi-Fi (802.1X), and network access control.

A: A phone call to security asking, “Is this user approved?”

RADIUS (Remote Authentication Dial-In User Service)

15
New cards

It is used to read and write information from a centralized directory. It stores users, devices, roles, and attributes, giving more context than just usernames and passwords.

A: A company phone directory with job titles and departments.

LDAP (Lightweight Directory Access Protocol)

16
New cards

It is an open standard or protocol for authentication and authorization that uses tokens. It allows users to authenticate once and access multiple web applications securely.

A: A stamped hand that proves you already paid.

SAML (Security Assertion Markup Language)

17
New cards

Is an authentication protocol commonly used for managing network devices like routers and switches. It separates authentication, authorization, and accounting.

TACACS+ (Terminal Access Controller Access Control System Plus)

18
New cards

Requires two or more authentication factors to prove identity, making access much more secure than a password alone.

A: ATM card + PIN.

Multifactor Authentication (MFA)

19
New cards

Generates a temporary code that changes every few seconds. Both client and server use time synchronization to validate the code.

A: A countdown safe code that keeps changing.

TOTP (Time-Based One-Time Password)

20
New cards

Are decoy systems or single decoy systems designed to attract attackers so you can study their behavior

A: Leaving out a jar of honey to catch a bear

Honeypots

21
New cards

Are larger, more complex networks of decoy systems to trap and monitor attacks.

A: The bigger the honey setup, the more you can learn.

Honeynets

22
New cards

Is a weakness in a system.

A: Unlocked door

Vulnerability

23
New cards

It is when someone takes advantage of a weakness within a company, system, etc.

A:Burglar breaking in

Exploit

24
New cards

Is any potential cause that could harm the system, intentional or accidental.

A: The possibility of burglary or fire

Threat

25
New cards

The three pillars of IT security:

Confidentiality = keep data secret

Integrity = keep data accurate

Availability = keep systems accessible

CIA Triad (Confidentiality, Integrity, Availability)

26
New cards

Is a European Union regulation that protects personal data of EU citizens. It ensures data is stored properly, gives individuals control over their data, and allows them to request deletion.

GDPR (General Data Protection Regulation)

27
New cards

Requires that data collected in a country must remain within that country unless legally allowed to move.

Data localization/locality

28
New cards

Is a standard that protects credit card information. It focuses on secure networks, protecting cardholder data, managing vulnerabilities, controlling access, monitoring systems, and maintaining security policies.

PCI DSS (Payment Card Industry Data Security Standard)

29
New cards

______networks let visitors access the internet without touching internal company systems. Often protected with passphrases or login portals.

A: A lobby in a building where visitors can wait, but not enter private offices.

Guest/Guest Network Segmentation

30
New cards

Bring Your Own Device policies separate personal devices from corporate systems. Company data stays secure while personal data remains private.

A: A locker in a gym—your stuff is private, but you can still use the facility safely.

BYOD (Bring Your Own Device) Segementation

31
New cards

_____ devices like smart home gadgets, sensors, or wearables—are segmented onto their own network to protect sensitive data and prevent them from accessing critical systems. This limits the damage if a device is compromised.

IoT Network Segmentation

32
New cards

_____ devices are industrial machines that communicate with each other in factories, hospitals, or energy plants. Segmentation ensures critical operations continue safely and prevents outside devices from interfering.

IIoT Segmentation

33
New cards

Systems monitor and control industrial processes like energy, water, or manufacturing. Segmentation ensures only authorized personnel access these systems, preventing accidental or malicious disruption.

A: A control room with restricted doors—only trained operators can enter and control the machinery.

Supervisory Control and Data Acquisition (SCADA) Segmentation

34
New cards

Manages the operation of industrial equipment and processes. Segmentation ensures that these systems are isolated from business networks, protecting uptime and preventing external attacks.

A: A factory floor fenced off from the office area—machines keep running without interference from office devices.

Industrial Control System (ICS) Segmentation

35
New cards

Includes systems that control critical infrastructure, like electricity grids, traffic lights, or hospital machinery. Segmentation ensures operational continuity and safety, even if other networks are compromised.

A: Critical infrastructure in a secure bunker—operations continue safely no matter what happens outside.

Operational Technology (OT) Segmentation