Network Defense

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/52

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

53 Terms

1
New cards

Confidentiality, Integrity, Availability

3 key areas of cyber security that needs to be protected

2
New cards

Confidentiality

Information must not be exposed or accessed by any unauthorized individual

3
New cards

Integrity

Information must be consistent and correct unless an unauthorized change was made

4
New cards

Availability

Information must be accessible when and where it is needed

5
New cards

Assets

Anything of value to an organization that must be protected including servers, infrastructure devices, end devices, and the greatest asset, data

6
New cards

Vulnerabilities

A weakness in a system or its design that could be exploited by a threat actor.

Ex: Operating system, Application, Configuration

7
New cards

Threats

Any potential danger to an asset

8
New cards

Assets

constitute the attack surface that threat actors could target

9
New cards

Asset management

consists of inventorying all assets, and then developing and implementing policies and procedures to protect them

10
New cards

People

are considered assets based on knowledge they possess, the access they maintain, the expertise they provide, or the influence they possess

11
New cards

Information

includes the procedures, capabilities, data, and corporate information which enable military and economic superiority

12
New cards

Equipment

is tangible property (other than land or buildings) determined to be essential for the warfighter, industrial base, or supporting activities

13
New cards

Facilities

are manufacturing research, development,testing, and evaluation, operations, or infrastructure related places that if compromised or incapacitated would detrimentally impact technology and programs

14
New cards

Activities

are functions, missions, actions, or collections of actions

15
New cards

Operations

are sequences of activities with a common theme

16
New cards

Suppliers

are entities whose linked activities are associated with providing components, subject matter expertise, or RDT&E activities that if compromise would detrimentally impact programs or technologies.

17
New cards

Asset Lifecycle Stages

Procurement, Deployment, Utilization, Disposal

18
New cards

Procurement

The organization purchases the assets based on the needs identified from data gathered to justify the purchase and be added to inventory

19
New cards

Deployment

The asset is assembled and inspected to check for defects or other problems. Staff perform tests and install tags or barcodes for tracking purposes. Then, it will be removed from inventory to in-use

20
New cards

Utilization

The asset’s performance is continuously checked. Upgrades, patch fixes, new license purchases and compliance audits are all part of the utilization stage.

21
New cards

Maintenance

helps to extend an asset’s productive life. Staff may modify or upgrade the asset

22
New cards

Disposal

At the end of the asset’s productive life, it must be disposed of. All data must be wiped from the asset. Any parts that can cause an environmental hazard must be disposed of according to local guidelines

23
New cards

Procurement

Checking in a new delivery of laptops

24
New cards

Deployment

Adding barcodes to new equipment

25
New cards

Utilization

Rolling out software patches

26
New cards

Maintenance

Upgrading outdated assets

27
New cards

Disposal

Taking broken equipment out of commission

28
New cards

Threat identification

provides an organization with a list of likely threats for a particular environment

29
New cards

Confidentiality

Internal system compromise- The attacker uses the exposed e-banking servers to break into an internal bank system

30
New cards

Confidentiality

Stolen customer data- An attacker steals the personal and financial data of bank customers from the customer database

31
New cards

Integrity

Phony transactions from an external server- An attacker alters the code of the e-banking application and makes transactions by impersonating a legitimate user

32
New cards

Confidentiality or Integrity

Phony transactions using a stolen customer PIN or smart card- An attacker steals the identity of a customer and completes malicious transactions from the compromised account.

33
New cards

Integrity

Insider attack on the system- A bank employee finds a flaw in the system from which to mount an attack.

34
New cards

Integrity

Data Input Errors- A user inputs incorrect data or makes incorrect transaction requests

35
New cards

Availability

Data center destruction- A cataclysmic event severely damages or destroys the data center.

36
New cards

Firewall

Receives incoming traffic

-Firewall does check packet details (source, destination, port etc.)

-Policy Validation

-Allows traffic once validated to the destination host

-Logs traffic details e.g Time, date, IP Addresses etc.

Endpoint Detection and Response

37
New cards

Endpoint Protection

not just the usual anti-malware software.

38
New cards

Dynamic Detection

Performs pattern and behavioral detection to flag suspicious activity and indicators of compromised

39
New cards

Network Monitoring

Can also monitor unusual and anomalous network traffic

40
New cards

Trafic-Based

Blocks malicious traffic coming from external network.

41
New cards

Intrusion Detection Systems (IDS)

functions the same but does not block its detected malicious traffic

42
New cards

Signature Updates

same as AV, IPS also needs to update for new signatures

43
New cards

Onion

A common analogy used to describe

a defense-in-depth approach is

called

44
New cards

artichoke

The changing landscape of networking,

such as the evolution of borderless

networks, has changed this analogy to

the

45
New cards

Layering

setting up different layers of protection, creating a barrier of multiple defenses that work

together to prevent attacks

46
New cards

Limiting

access to data and information reduces the possibility of a security threat. An organization

should restrict access so that each user only has the level of access required to do their job.

47
New cards

Diversity

The layers must be different so that if one layer is penetrated, the same technique will not

work on all the others which would compromise the whole system

48
New cards

Obscurity

Organization should not reveal any information that cybercriminals can use to identify

critical information e.g. Operating System (OS), type or make of equipment or software it uses

49
New cards

Complexity

implementation of complex systems that are hard to understand and troubleshoot, this

may backfire

50
New cards

Regulations

and associated fines and penalties can be

imposed by governments at the national, regional or local level

51
New cards

Standards

cover a broad range of issues and ideas and may provide assurance

that an organization is operating with policies and procedures that support regulations and are widely accepted best practices

52
New cards

Policy

is informed by applicable law(s) and specifies which standards and guidelines the organization will follow

53
New cards

Procedures

Define the explicit, repeatable activities necessary to accomplish a specific task or set of tasks.They provide supporting data, decision criteria or explicit knowledge needed to perform each task