Network and Security Foundation (partial) D315

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/69

flashcard set

Earn XP

Description and Tags

Supplemental flashcards for the parts of the OA I did poorly on

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

70 Terms

1
New cards

Enterprise Networks

Utilizes dedicated devices for routing, firewalls, and switches, offering better performance and advanced configuration functionality for optimizing business-grade networks.

2
New cards

Switch

Primary device in a LAN that facilitates communication between devices, operates at Layer 2 of OSI, and uses MAC addresses to track traffic.

3
New cards

Cloud Computing

Provides an alternative for businesses to outsource IT infrastructure or software services to cloud providers, such as Google Drive or iCloud, offering scalability and cost-effective pay-as-you-go models.

4
New cards

Security Policies

Guidelines and rules set to protect information and technology assets, including Data handling policy, Password Policy, Acceptable Use Policy, Bring Your Own Device policy, Privacy Policy, Least Privilege, Complete Mediation, and Separation of Privilege/Duties.

5
New cards

Least Privilege

Limits user rights and access control permissions to the minimum necessary for job performance, reducing insider threats, enhancing system stability, and streamlining compliance and auditing.

6
New cards

Complete Mediation

Ensures continuous permission checks for resource access, preventing unauthorized entry, and implements best practices like timeouts and account locks for security.

7
New cards

Separation of Privilege/Duties

Requires multiple individuals for critical tasks, preventing fraud and ensuring no single person can complete important actions alone.

8
New cards

Fail-Safe Defaults

Default to maximum security settings, access is denied by default, applies when handling errors and exceptions.

9
New cards

Economy of Mechanism

Keep security systems simple, use proven components, stick to essentials, add more components if needed.

10
New cards

Least Common Mechanism

Use separate resources for different users, prevent information leaks, minimize damage from breaches.

11
New cards

Human-centered Design

Design systems for ease of use, implement user-friendly security, focus on people and consider the whole system.

12
New cards

Psychological Acceptability

Keep security design simple and intuitive, use user-friendly authentication, integrate security into daily routines.

13
New cards

Open-design

Security shouldn't rely on secrecy, can be reviewed for improvement, should remain secure even if system workings are known.

14
New cards

Zero-trust

Distrust by default, verify everything.

15
New cards

Firewalls

Primary IT security device, filter traffic based on rules, can be hardware or software, provide network protection.

16
New cards

Encryption

The process of transforming information in a way that, ideally, only authorized parties can decode. This process converts the original representation of the information, known as plaintext, into an alternative form known as ciphertext.

17
New cards

Mitigation of Cyberattacks

Policies, standards, procedures, guidelines, foundational IT security policies, vulnerability and threat assessment.

18
New cards

Cloud Security

Also known as cloud computing security, is a collection of security measures designed to protect cloud-based infrastructure, applications, and data

19
New cards

Principles of Network Security Design

Common security policies, data handling policies, safeguarding data in transit, secure data disposal.

20
New cards

Password Policies

Policies that dictate the requirements for creating and managing passwords to enhance security.

21
New cards

Acceptable Use Policies (AUP)

Agreements detailing the appropriate use of corporate network access, specifying user permissions and restrictions.

22
New cards

Bring Your Own Device (BYOD)

Policy allowing employees to use personal devices for work purposes, with different access options.

23
New cards

Privacy Policy

Policy safeguarding intellectual property, personal information, and health data from unauthorized access.

24
New cards

Human Centered Design Principles

Design approach focusing on solving root issues, prioritizing people over technology, and iterative prototyping.

25
New cards

Least Privilege

Principle granting employees only the minimum access rights necessary for their tasks to reduce exposure and limit access.

26
New cards

Fail-safe defaults

System design ensuring safe states during failures, with explicit deny authorization by default.

27
New cards

Economy Of Mechanism

Security principle advocating for simplicity, use of trusted components, and removal of unnecessary services.

28
New cards

Zero Trust

Security model distrusting all clients and hosts, emphasizing multi-factor authentication and continuous authentication.

29
New cards

Complete Mediation

Security concept requiring authorization for system access every time, preventing bypass and managing sessions securely.

30
New cards

Open Design

Principle advocating for system security independent of design, ensuring robust security measures are in place.

31
New cards

Firewall Types

Different types like Packet Filtering, Stateful Inspection, and Application Proxy, each with specific functionalities.

32
New cards

Deployment Techniques

Various approaches like Border Firewall, Screened Subnet, Multilayered Firewalls, and Unified Threat Management for network protection.

33
New cards

IDS/IPS

Intrusion Detection/Prevention Systems categorized into Network and Host-based, active and passive, using signatures and heuristics for threat detection.

34
New cards

Encryption

Data protection method using keys to scramble and unscramble data, with symmetric and asymmetric encryption options.

35
New cards

Network Device Hardening

Strategies to secure network devices by limiting connectivity to sensitive resources and adding countermeasures.

36
New cards

Security Hardening

Approach involving layered security controls to protect data, network, and applications, with a focus on defense in depth.

37
New cards

Risk Mitigation Strategies

Techniques to reduce the likelihood or impact of threats, considering cost-effectiveness and risk profiles for decision-making.

38
New cards

Risk Appetite Types

Different levels of willingness to take risks, including Averse, Minimal, Cautious, Open, and Hungry.

39
New cards

Security Risk Identification

Involves assessing and implementing security measures, focusing on preventing vulnerabilities, and being integral to an organization's risk management process.

40
New cards

Access Control Models

Include Discretionary Access Control (DAC), Role-based Access Control (RBAC), Attribute-based Access Control (ABAC), Rule-based Access Control (RuBAC), and Context-based Access Control (CBAC).

41
New cards

Data Classification

Categorizes data into Sensitive, Confidential, Private, and Public based on the level of harm its release could cause.

42
New cards

Wi-Fi Security Protocols

Include Authentication, Encryption, Open System Authentication, Shared Key Authentication, and Extensible Authentication Methods for securing wireless networks.

43
New cards

Security Standards and Frameworks

Encompass various categories like Internal and External standards, with examples such as NIST, ISO, PCI, and COSO, aiming to align IT with business goals and manage risks effectively.

44
New cards

Wireless Attack Types

Involve Extensible Authentication Methods, Client-To-Client Attacks, and Denial Of Service (DoS) Attacks targeting WLANs with various methods like flooding network resources on different OSI model layers.

45
New cards

Unauthorized Access

Also known as unauthorized or illicit use attacks, involves adding an unauthorized device to a wireless network to gain access to the internet gateway or the wired network that an AP is connected to.

46
New cards

Interception Attacks

Attacks that involve listening in on network traffic for information, such as ARP spoofing, which resolves IP addresses to MAC addresses on TCP/IP networks.

47
New cards

Eavesdropping

A wireless attack method where an attacker listens in on network traffic for information, also known as sniffing, to steal data in transit over a network.

48
New cards

Deauthentication

A wireless attack method that involves taking someone off the network using deauthentication frames, which do not require encryption, only the MAC address.

49
New cards

Single Sign-On (SSO)

A system that provides users with a single login and password authentication requirement, requiring role-based access control for seamless authentication.

50
New cards

Access Control Policies

Include principles like least privilege, separation of duties, and no shared accounts, to ensure proper user identification, authentication, authorization, and accounting.

51
New cards

Security Governance

Defines how security is executed and controlled, ensuring alignment between security and business objectives, and is a subset of enterprise governance.

52
New cards

Compliance Laws and Regulations

Include acts like FISMA, SOX, GLBA, HIPAA, CIPA, and FERPA, which mandate security controls and privacy protection for various sectors.

53
New cards

GDPR

General Data Protection Regulation, a privacy law in the EU that standardizes privacy rules, applies to organizations dealing with EU citizens, and ensures the privacy of personal data.

54
New cards

PIPEDA

Personal Information Protection and Electronic Documents Act, a federal privacy legislation in Canada that governs the collection, use, and disclosure of personal information, emphasizing data protection principles.

55
New cards

Network Segregation

Dividing the network into smaller segments to enhance security.

56
New cards

Centralized Log Management

Collecting and analyzing logs in one location for better security monitoring.

57
New cards

Network Address Translation (NAT)

Translates private IP addresses in an internal network to a public IP address before packets are sent to an external network.

58
New cards

Honeypots and Honeynets

Deceptive tools to lure attackers and study their behavior.

59
New cards

Physical Security Measures

Safeguarding network devices and equipment physically.

60
New cards

Data Loss Prevention

Implementing solutions to prevent unauthorized data leakage.

61
New cards

Third-Party Security Assessment

Evaluation of network security by an external entity.

62
New cards

Incident Management Process

Procedures to handle and respond to security incidents.

63
New cards

Principle of Least Privilege

Granting minimal access rights necessary for tasks.

64
New cards

Defense in Depth

Layered security approach to protect against multiple threats.

65
New cards

Security Policy Implementation

Establishing rules and guidelines for network security.

66
New cards

Multi-Factor Authentication

Using multiple verification methods for user authentication.

67
New cards

Complex Password Policy

Enforcing strong password requirements for security.

68
New cards

User Activity Monitoring

Continuous tracking of user actions for security purposes.

69
New cards

Network Monitoring Tools

Software for observing network traffic and activities.

70
New cards

Regular Audits

Periodic reviews to assess and improve network security measures.