Network and Security Foundation (partial) D315

studied byStudied by 0 people
0.0(0)
learn
LearnA personalized and smart learning plan
exam
Practice TestTake a test on your terms and definitions
spaced repetition
Spaced RepetitionScientifically backed study method
heart puzzle
Matching GameHow quick can you match all your cards?
flashcards
FlashcardsStudy terms and definitions

1 / 69

flashcard set

Earn XP

Description and Tags

Supplemental flashcards for the parts of the OA I did poorly on

70 Terms

1

Enterprise Networks

Utilizes dedicated devices for routing, firewalls, and switches, offering better performance and advanced configuration functionality for optimizing business-grade networks.

New cards
2

Switch

Primary device in a LAN that facilitates communication between devices, operates at Layer 2 of OSI, and uses MAC addresses to track traffic.

New cards
3

Cloud Computing

Provides an alternative for businesses to outsource IT infrastructure or software services to cloud providers, such as Google Drive or iCloud, offering scalability and cost-effective pay-as-you-go models.

New cards
4

Security Policies

Guidelines and rules set to protect information and technology assets, including Data handling policy, Password Policy, Acceptable Use Policy, Bring Your Own Device policy, Privacy Policy, Least Privilege, Complete Mediation, and Separation of Privilege/Duties.

New cards
5

Least Privilege

Limits user rights and access control permissions to the minimum necessary for job performance, reducing insider threats, enhancing system stability, and streamlining compliance and auditing.

New cards
6

Complete Mediation

Ensures continuous permission checks for resource access, preventing unauthorized entry, and implements best practices like timeouts and account locks for security.

New cards
7

Separation of Privilege/Duties

Requires multiple individuals for critical tasks, preventing fraud and ensuring no single person can complete important actions alone.

New cards
8

Fail-Safe Defaults

Default to maximum security settings, access is denied by default, applies when handling errors and exceptions.

New cards
9

Economy of Mechanism

Keep security systems simple, use proven components, stick to essentials, add more components if needed.

New cards
10

Least Common Mechanism

Use separate resources for different users, prevent information leaks, minimize damage from breaches.

New cards
11

Human-centered Design

Design systems for ease of use, implement user-friendly security, focus on people and consider the whole system.

New cards
12

Psychological Acceptability

Keep security design simple and intuitive, use user-friendly authentication, integrate security into daily routines.

New cards
13

Open-design

Security shouldn't rely on secrecy, can be reviewed for improvement, should remain secure even if system workings are known.

New cards
14

Zero-trust

Distrust by default, verify everything.

New cards
15

Firewalls

Primary IT security device, filter traffic based on rules, can be hardware or software, provide network protection.

New cards
16

Encryption

The process of transforming information in a way that, ideally, only authorized parties can decode. This process converts the original representation of the information, known as plaintext, into an alternative form known as ciphertext.

New cards
17

Mitigation of Cyberattacks

Policies, standards, procedures, guidelines, foundational IT security policies, vulnerability and threat assessment.

New cards
18

Cloud Security

Also known as cloud computing security, is a collection of security measures designed to protect cloud-based infrastructure, applications, and data

New cards
19

Principles of Network Security Design

Common security policies, data handling policies, safeguarding data in transit, secure data disposal.

New cards
20

Password Policies

Policies that dictate the requirements for creating and managing passwords to enhance security.

New cards
21

Acceptable Use Policies (AUP)

Agreements detailing the appropriate use of corporate network access, specifying user permissions and restrictions.

New cards
22

Bring Your Own Device (BYOD)

Policy allowing employees to use personal devices for work purposes, with different access options.

New cards
23

Privacy Policy

Policy safeguarding intellectual property, personal information, and health data from unauthorized access.

New cards
24

Human Centered Design Principles

Design approach focusing on solving root issues, prioritizing people over technology, and iterative prototyping.

New cards
25

Least Privilege

Principle granting employees only the minimum access rights necessary for their tasks to reduce exposure and limit access.

New cards
26

Fail-safe defaults

System design ensuring safe states during failures, with explicit deny authorization by default.

New cards
27

Economy Of Mechanism

Security principle advocating for simplicity, use of trusted components, and removal of unnecessary services.

New cards
28

Zero Trust

Security model distrusting all clients and hosts, emphasizing multi-factor authentication and continuous authentication.

New cards
29

Complete Mediation

Security concept requiring authorization for system access every time, preventing bypass and managing sessions securely.

New cards
30

Open Design

Principle advocating for system security independent of design, ensuring robust security measures are in place.

New cards
31

Firewall Types

Different types like Packet Filtering, Stateful Inspection, and Application Proxy, each with specific functionalities.

New cards
32

Deployment Techniques

Various approaches like Border Firewall, Screened Subnet, Multilayered Firewalls, and Unified Threat Management for network protection.

New cards
33

IDS/IPS

Intrusion Detection/Prevention Systems categorized into Network and Host-based, active and passive, using signatures and heuristics for threat detection.

New cards
34

Encryption

Data protection method using keys to scramble and unscramble data, with symmetric and asymmetric encryption options.

New cards
35

Network Device Hardening

Strategies to secure network devices by limiting connectivity to sensitive resources and adding countermeasures.

New cards
36

Security Hardening

Approach involving layered security controls to protect data, network, and applications, with a focus on defense in depth.

New cards
37

Risk Mitigation Strategies

Techniques to reduce the likelihood or impact of threats, considering cost-effectiveness and risk profiles for decision-making.

New cards
38

Risk Appetite Types

Different levels of willingness to take risks, including Averse, Minimal, Cautious, Open, and Hungry.

New cards
39

Security Risk Identification

Involves assessing and implementing security measures, focusing on preventing vulnerabilities, and being integral to an organization's risk management process.

New cards
40

Access Control Models

Include Discretionary Access Control (DAC), Role-based Access Control (RBAC), Attribute-based Access Control (ABAC), Rule-based Access Control (RuBAC), and Context-based Access Control (CBAC).

New cards
41

Data Classification

Categorizes data into Sensitive, Confidential, Private, and Public based on the level of harm its release could cause.

New cards
42

Wi-Fi Security Protocols

Include Authentication, Encryption, Open System Authentication, Shared Key Authentication, and Extensible Authentication Methods for securing wireless networks.

New cards
43

Security Standards and Frameworks

Encompass various categories like Internal and External standards, with examples such as NIST, ISO, PCI, and COSO, aiming to align IT with business goals and manage risks effectively.

New cards
44

Wireless Attack Types

Involve Extensible Authentication Methods, Client-To-Client Attacks, and Denial Of Service (DoS) Attacks targeting WLANs with various methods like flooding network resources on different OSI model layers.

New cards
45

Unauthorized Access

Also known as unauthorized or illicit use attacks, involves adding an unauthorized device to a wireless network to gain access to the internet gateway or the wired network that an AP is connected to.

New cards
46

Interception Attacks

Attacks that involve listening in on network traffic for information, such as ARP spoofing, which resolves IP addresses to MAC addresses on TCP/IP networks.

New cards
47

Eavesdropping

A wireless attack method where an attacker listens in on network traffic for information, also known as sniffing, to steal data in transit over a network.

New cards
48

Deauthentication

A wireless attack method that involves taking someone off the network using deauthentication frames, which do not require encryption, only the MAC address.

New cards
49

Single Sign-On (SSO)

A system that provides users with a single login and password authentication requirement, requiring role-based access control for seamless authentication.

New cards
50

Access Control Policies

Include principles like least privilege, separation of duties, and no shared accounts, to ensure proper user identification, authentication, authorization, and accounting.

New cards
51

Security Governance

Defines how security is executed and controlled, ensuring alignment between security and business objectives, and is a subset of enterprise governance.

New cards
52

Compliance Laws and Regulations

Include acts like FISMA, SOX, GLBA, HIPAA, CIPA, and FERPA, which mandate security controls and privacy protection for various sectors.

New cards
53

GDPR

General Data Protection Regulation, a privacy law in the EU that standardizes privacy rules, applies to organizations dealing with EU citizens, and ensures the privacy of personal data.

New cards
54

PIPEDA

Personal Information Protection and Electronic Documents Act, a federal privacy legislation in Canada that governs the collection, use, and disclosure of personal information, emphasizing data protection principles.

New cards
55

Network Segregation

Dividing the network into smaller segments to enhance security.

New cards
56

Centralized Log Management

Collecting and analyzing logs in one location for better security monitoring.

New cards
57

Network Address Translation (NAT)

Translates private IP addresses in an internal network to a public IP address before packets are sent to an external network.

New cards
58

Honeypots and Honeynets

Deceptive tools to lure attackers and study their behavior.

New cards
59

Physical Security Measures

Safeguarding network devices and equipment physically.

New cards
60

Data Loss Prevention

Implementing solutions to prevent unauthorized data leakage.

New cards
61

Third-Party Security Assessment

Evaluation of network security by an external entity.

New cards
62

Incident Management Process

Procedures to handle and respond to security incidents.

New cards
63

Principle of Least Privilege

Granting minimal access rights necessary for tasks.

New cards
64

Defense in Depth

Layered security approach to protect against multiple threats.

New cards
65

Security Policy Implementation

Establishing rules and guidelines for network security.

New cards
66

Multi-Factor Authentication

Using multiple verification methods for user authentication.

New cards
67

Complex Password Policy

Enforcing strong password requirements for security.

New cards
68

User Activity Monitoring

Continuous tracking of user actions for security purposes.

New cards
69

Network Monitoring Tools

Software for observing network traffic and activities.

New cards
70

Regular Audits

Periodic reviews to assess and improve network security measures.

New cards
robot