Networking Security Overview

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/35

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

36 Terms

1
New cards

Threat

An event that has potential to violate security policies.

2
New cards

Vulnerability

A weakness in a system that makes a threat possible.

3
New cards

Attack

The realization of a threat that exploits vulnerabilities in the system.

4
New cards

Application Layer

Adds application-specific header for control information in the protocol stack.

5
New cards

Transport Layer

Ensures reliable data transmission and identifies application processes.

6
New cards

Link Layer

Adds ethernet packet header and calculates CRC in the protocol stack.

7
New cards

Internet Gateway

Connects a local area network (LAN) to the internet, often managed by an ISP.

8
New cards

SYN Flood

Floods the protocol stack with SYN packets to produce half-open connections.

9
New cards

Source Routing Attack

Redirects traffic to an impersonating host using specific IP header options.

10
New cards

IP Spoofing

Forges the sender’s IP address, often requiring correct sequence number guessing.

11
New cards

Cache Poisoning

Misleads DNS resolvers into accepting bogus data.

12
New cards

Denial of Service (DoS)

Overloads servers to inhibit their response capability.

13
New cards

Traffic Filtering

Technique to discard unwanted packets based on various configurations.

14
New cards

Packet Filtering

Discards unwanted packets based on MAC Address, IP Address, Application Protocol, and Content Patterns.

15
New cards

Symmetric Encryption

Uses the same key for both encryption and decryption.

16
New cards

Asymmetric Encryption

Uses a public key to encrypt and a private key to decrypt.

17
New cards

Digital Signatures

Hashing data for verification purposes in cryptography.

18
New cards

Key Management

Crucial for proper management of cryptographic keys including distribution and revocation.

19
New cards

Hardware Security Module (HSM)

Standalone, tamper-proof device meant solely for key storage.

20
New cards

Trusted Platform Module (TPM)

Chip integrated into devices ensuring key security for desktops and laptops.

21
New cards

Single Cryptonet

A shared secret key among all users.

22
New cards

Group Cryptonets

A shared key for certain groups of users.

23
New cards

Pairwise Key Sharing

A unique key for each pair of endpoints.

24
New cards

Key Distribution Center

Central server that distributes keys securely.

25
New cards

Public Key Distribution

Techniques to distribute keys using public key cryptography.

26
New cards

IPsec

Protocol used in VPNs to secure communications at the IP layer.

27
New cards

SSL/TLS

Provides encryption and secure data exchange between client and server.

28
New cards

Handshake Protocol

Initiates a secure connection and performs key exchanges in SSL/TLS.

29
New cards

Record Protocol

Handles data transmission securely in SSL/TLS.

30
New cards

VPN (Virtual Private Network)

Enables secure access to a network over the internet.

31
New cards

Case Study 1

Use IPSec to prevent impersonation of legitimate nodes.

32
New cards

Case Study 2

Use VPN for secure remote access to internal resources.

33
New cards

Case Study 3

Use SSL for secure file transfers during data in transit.

34
New cards

Confidentiality

One of the key principles of effective network security.

35
New cards

Integrity

Ensures data is accurate and trustworthy in network communication.

36
New cards

Availability

Ensures that network resources are accessible when needed.