NETWORK SECURITY

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/29

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

30 Terms

1
New cards

least common mechanism

It emphasizes reducing shared components or failure modes between subsystems to avoid cascading failures.

2
New cards

fail-safe mechanism

It defaults the system to a safe state in the event of a failure to minimize harm or risk.

3
New cards

economy of mechanism principle

Keeping the design as simple and minimal as possible to reduce complexity and minimize the chance of failure.

4
New cards

physiological acceptability

It ensures that a system is designed with the user’s physical and psychological needs in mind.

5
New cards

packet-filtering firewall

It inspects packets of data and allows or blocks them based on predefined rules like IP addresses and ports.

6
New cards

stateful inspection firewalls?

 Tracks the state of active connections and makes decisions based on the context (e.g., whether the packet is part of an established session).  Allows the firewall to monitor and record the state of network connections (like TCP handshakes) and ensures that incoming packets are part of a legitimate, established communication session.

7
New cards

proxy firewall

Acts as an intermediary between the client and the server, hiding the internal network and inspecting traffic at the application layer.

8
New cards

next-generation firewalls (NGFW)

They combine traditional capabilities with advanced features like deep packet inspection and intrusion prevention.

9
New cards

web application firewall (WAF)?

To protect web applications by filtering and monitoring HTTP/HTTPS traffic.

10
New cards

zero trust

The principle of 'never trust, always verify' for all users and systems attempting access.

11
New cards

authentication in the AAA triad

The process of verifying the identity of a user, device, or system.

12
New cards

authorization in the AAA triad

To grant or deny access to resources based on an authenticated entity's permissions.

13
New cards

accounting (or auditing) in the AAA triad

To track and record user activities for auditing, monitoring, and compliance purposes.

14
New cards

discretionary access control (DAC)

The resource owner has full control over who can access their resources.

15
New cards

role-based access control (RBAC)

RBAC assigns permissions based on roles within an organization, simplifying permission management.

16
New cards

rule-based access control (RBAC)

Access is granted based on a set of predefined rules that specify conditions like time or location.

17
New cards

attribute-based access control (ABAC)

It grants access based on attributes of the user, the resource, and the environment.

18
New cards

malware?

Malicious software designed to damage or gain unauthorized access to systems.

19
New cards

phishing

Fraudulent attempts to acquire sensitive information via deceptive communication.

20
New cards

denial of service (DoS)

disrupt the normal functioning of a server, network, or service by overwhelming it with a flood of traffic or sending data that causes it to crash. The goal is to make the targeted resource unavailable to legitimate users.

21
New cards

SQL injection

By inserting malicious SQL queries into a database to access or manipulate data.

22
New cards

What differentiates a Smurf Attack from a Ping Flood?

A Smurf Attack uses broadcast addresses and IP spoofing to amplify the attack.

23
New cards

WEP?

WEP uses RC4 encryption and is considered obsolete and insecure.

24
New cards

What improvements does WPA2 provide over its predecessors?

Uses AES for encryption and mandatory CCMP for enhanced security.

25
New cards

What defines the differences between symmetric and asymmetric encryption?

Symmetric uses a single key for encryption and decryption, while asymmetric uses two keys: a public and a private key.

26
New cards

Acceptable Use Policy (AUP)

To define acceptable behaviors related to the use of an organization's IT resources.

27
New cards

Security Awareness Policy.

To educate employees on security practices and how to recognize and prevent security threats.

28
New cards

Asset Management Policy

To establish procedures for identifying, tracking, and managing the organization’s assets.

29
New cards

PIPEDA

To protect individuals' privacy by governing how organizations handle personal information.

30
New cards

Intrusion Detection System (IDS)

To monitor network traffic for suspicious behavior and alert administrators.