Network + 3.5 - Network Access and Management Methods + 4.1 Basic Network Security Concepts

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall with Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/45

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No study sessions yet.

46 Terms

1
New cards

Site-to-Site VPN

Securely connects entire networks over the internet.

2
New cards

Client-to-Site VPN

Allows remote users to securely access a corporate network.

3
New cards

Clientless VPN

Provides VPN access through a web browser without client software.

4
New cards

Split Tunnel VPN

Only corporate traffic goes through the VPN.

5
New cards

Full Tunnel VPN

All traffic is routed through the VPN.

6
New cards

Secure Shell (SSH)

Encrypted protocol for secure remote device management.

7
New cards

Graphical User Interface (GUI)

Visual interface for managing systems using point-and-click.

8
New cards

API (Application Programming Interface)

Enables programmatic and automated interaction with network devices.

9
New cards

Console Connection

Direct physical access used for setup and recovery.

10
New cards

Jump Box/Host

Secure intermediary system used to access sensitive network zones.

11
New cards

In-Band Management

Device management using the production network.

12
New cards

Out-of-Band Management

Management through a separate, dedicated network.

13
New cards

Logical Security

Software-based controls protecting data, systems, and network access.

14
New cards

Encryption

Converts readable data into unreadable ciphertext without a decryption key.

15
New cards

Data in Transit Encryption

Protects data moving across networks using HTTPS, TLS, or VPNs.

16
New cards

Data at Rest Encryption

Protects stored data using full disk or file-level encryption.

17
New cards

Certificates in Network Security

Binds a public key to an identity using cryptography.

18
New cards

Public Key Infrastructure (PKI)

Framework for creating, managing, and revoking digital certificates.

19
New cards

Self-Signed Certificates

Certificate signed by its own creator and not inherently trusted.

20
New cards

Identity and Access Management (IAM)

Manages digital identities and controls access to resources.

21
New cards

Authentication in IAM

Verifies a user’s identity before granting access.

22
New cards

Least Privilege

Grants only the minimum access needed to perform tasks.

23
New cards

Role Based Access Control (RBAC)

Assigns permissions based on job roles.

24
New cards

Geofencing

Restricts or triggers actions based on physical location.

25
New cards

Physical Security

Protects facilities, equipment, and personnel from physical threats.

26
New cards

Security Cameras

Monitor and record activity for deterrence and evidence.

27
New cards

Locks

Control physical access to buildings and sensitive areas.

28
New cards

Deception Technology

Uses fake assets to lure and study attackers.

29
New cards

Honeypot

Decoy system designed to attract attackers.

30
New cards

Honeynet

Network of honeypots simulating a real environment.

31
New cards

Risk

Likelihood and impact of a threat exploiting a vulnerability.

32
New cards

Vulnerability

Weakness that can be exploited by a threat.

33
New cards

Exploit

Method used to take advantage of a vulnerability.

34
New cards

Threat

Potential cause of harm to a system or data.

35
New cards

Confidentiality

Prevents unauthorized access to information.

36
New cards

Integrity

Ensures data is accurate and unaltered.

37
New cards

Availability

Ensures systems and data are accessible when needed.

38
New cards

Audit and Regulatory Compliance

Formal review to ensure security and regulatory compliance.

39
New cards

Data Locality

Requirement that data be stored in specific geographic regions.

40
New cards

PCI DSS

Security standard for protecting credit card data.

41
New cards

General Data Protection Regulation (GDPR)

  • EU regulation protecting personal data and privacy.

42
New cards

Network Segmentation

Divides networks to reduce attack surface.

43
New cards

Internet of Things & Industrial internetw of Things (IoT/IIoT Segmentation)

Isolates IoT devices to limit security risks.

44
New cards

Security Control and Data Acquistion , Industrial Control System, and Operational Technology (SCADA/ICS/OT SegmentationZ)

Separates industrial systems from IT networks.

45
New cards

Guest Network Segmentation

Isolates guest access from internal resources.

46
New cards

BYOD Segmentation

BYOD Segmentation