1/35
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Threat
An event that has potential to violate security policies.
Vulnerability
A weakness in a system that makes a threat possible.
Attack
The realization of a threat that exploits vulnerabilities in the system.
Application Layer
Adds application-specific header for control information in the protocol stack.
Transport Layer
Ensures reliable data transmission and identifies application processes.
Link Layer
Adds ethernet packet header and calculates CRC in the protocol stack.
Internet Gateway
Connects a local area network (LAN) to the internet, often managed by an ISP.
SYN Flood
Floods the protocol stack with SYN packets to produce half-open connections.
Source Routing Attack
Redirects traffic to an impersonating host using specific IP header options.
IP Spoofing
Forges the sender’s IP address, often requiring correct sequence number guessing.
Cache Poisoning
Misleads DNS resolvers into accepting bogus data.
Denial of Service (DoS)
Overloads servers to inhibit their response capability.
Traffic Filtering
Technique to discard unwanted packets based on various configurations.
Packet Filtering
Discards unwanted packets based on MAC Address, IP Address, Application Protocol, and Content Patterns.
Symmetric Encryption
Uses the same key for both encryption and decryption.
Asymmetric Encryption
Uses a public key to encrypt and a private key to decrypt.
Digital Signatures
Hashing data for verification purposes in cryptography.
Key Management
Crucial for proper management of cryptographic keys including distribution and revocation.
Hardware Security Module (HSM)
Standalone, tamper-proof device meant solely for key storage.
Trusted Platform Module (TPM)
Chip integrated into devices ensuring key security for desktops and laptops.
Single Cryptonet
A shared secret key among all users.
Group Cryptonets
A shared key for certain groups of users.
Pairwise Key Sharing
A unique key for each pair of endpoints.
Key Distribution Center
Central server that distributes keys securely.
Public Key Distribution
Techniques to distribute keys using public key cryptography.
IPsec
Protocol used in VPNs to secure communications at the IP layer.
SSL/TLS
Provides encryption and secure data exchange between client and server.
Handshake Protocol
Initiates a secure connection and performs key exchanges in SSL/TLS.
Record Protocol
Handles data transmission securely in SSL/TLS.
VPN (Virtual Private Network)
Enables secure access to a network over the internet.
Case Study 1
Use IPSec to prevent impersonation of legitimate nodes.
Case Study 2
Use VPN for secure remote access to internal resources.
Case Study 3
Use SSL for secure file transfers during data in transit.
Confidentiality
One of the key principles of effective network security.
Integrity
Ensures data is accurate and trustworthy in network communication.
Availability
Ensures that network resources are accessible when needed.