Basic Technical Questions Flashcards
IDS vs IPS
Intrusion Detection System vs Intrusion Prevention System
Both are network security systems - one can prevent and detect the other can only detect
Symmetric Encryption
Uses a single key to both encrypt and decrypt data. This method is faster and easier to use than asymmetric encryption, but it’s also less secure
Zero Trust Architecture
Implies assuming no implicit trust from within a network and verifies every request as if it originates from an open network.
Common Network Attacks
DDOS, MITM, Phishing, SQL injection
Asymmetric Encryption
Uses two different keys, one public and one private, to encrypt and decrypt data. This method is more secure than symmetric encryption because even if one key is compromised, the data remains safe. Slower
Hashing
is a one-way function that converts data into a fixed-length hash value. Used to verify integrity. SHA256 for example
Encyption
Encryption is a 2 way Secure encoding of data used to protect the confidentiality of data.
What is a VPN?
Virtual Private Network
creates a secure, encrypted connection over a less secure network, typically the internet. It secures communication by encrypting data transmitted between the VPN client and server
TCP
Transmission Control Protocol
connection-oriented, providing reliable data transfer with error checking and flow control.
Used for things that require accuracy not speed
UDP
User Diagram Protocol
Connectionless, offering faster, but less reliable, communication. Used for VOIP, streaming and gaming
Layer 1
Physical Layer
Layer 2
Data Layer
Layer 3
Network Layer
Layer 4
Transport Layer
Layer 5
Session Layer