Network Layers and Security Principles

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/20

flashcard set

Earn XP

Description and Tags

Flashcards covering key concepts related to network layers, security principles, and access control mechanisms.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

21 Terms

1
New cards

Physical Layer

Handles the transmission of raw binary data over physical mediums like cables or wireless signals.

2
New cards

Data Link Layer

Responsible for node-to-node data transfer and error detection, packaging raw bits into frames.

3
New cards

Network Layer

Manages packet routing by finding the best physical path for data to reach its destination.

4
New cards

Transport Layer

Ensures data transfer is reliable and error-free between host systems.

5
New cards

Session Layer

Manages sessions or connections between applications on different devices.

6
New cards

Presentation Layer

Translates data between the application layer and the network, managing data encoding, encryption, and compression.

7
New cards

Application Layer

Where user interaction occurs, providing network services to applications.

8
New cards

Firewall

A network security device designed to monitor, filter, and control incoming and outgoing network traffic based on predetermined security rules.

9
New cards

Packet Filtering Firewall

The most basic type of firewall that allows or blocks packets based on pre-defined rules.

10
New cards

Stateful Inspection Firewall

Tracks the state of network connections and allows or blocks traffic based on established sessions.

11
New cards

Proxy Firewall

Acts as an intermediary between users and a web server, handling requests on behalf of clients.

12
New cards

Next-Generation Firewall (NGFW)

Combines traditional firewall features with advanced security functions like deep packet inspection.

13
New cards

Discretionary Access Control (DAC)

Allows resource owners to set policies defining who can access their resources.

14
New cards

Mandatory Access Control (MAC)

Access policies are defined by a central authority, not by the resource owners.

15
New cards

Role-Based Access Control (RBAC)

Restricts access based on a user’s role within an organization.

16
New cards

Attribute-Based Access Control (ABAC)

Considers multiple attributes to determine access rights according to defined rules.

17
New cards

Rule-Based Access Control

Applies specific rules to allow or deny access based on organizational conditions.

18
New cards

Principle of Least Privilege

Restricts access rights for users or systems to only what is necessary to perform their tasks.

19
New cards

Separation of Duties

Divides tasks and permissions among multiple individuals to prevent fraud, errors, or abuse.

20
New cards

Economy of Mechanism

Security mechanisms should be as simple as possible to reduce potential vulnerabilities.

21
New cards

Psychological Acceptability

Security measures should not make resources harder to access; they should be user-friendly.