Basics Flashcards
3 main types of Physical Security Controls
Access Controls, Monitoring, and Deterrents
Access Control Examples
Mantraps, Turnstiles/Gates, Electronic Doors
Monitoring Controls Examples
CCTV, Security Guards, Intrusion Detection Systems
Deterrent Examples
Warning Signs, Fences, Guard Dogs, Security Lighting, CCTV Cameras
7 types of Endpoint Security
HIDS, HIPS, Anti-Virus Solutions, Log Monitoring, Endpoint Detection and Response (EDR), Vulnerability Scanning, Compliance Scanning
4 types Email Security
Spam Filter, Data Loss Prevention, Email Scanning, Security Awareness Training
5 types of Network Security
Network Intrusion Detection, Network Intrusion Prevention, Firewalls, Log Monitoring, Network Access Control
Authentication
Something you know, Something you have, something you are
Authorization
What the authenticated user is permitted to do/access
Accountability
the process of being able to identify what has happened and when
What is Transmission Control Protocol (TCP)
a connection-oriented protocol that allows two systems to establish a connection that will enable the two-way transmission of data. Any data loss is detected and automatically corrected, which is why TCP is a reliable protocol.
What layer does TCP work at?
transport
How do systems communicate with each other using TCP?
- The requesting client sends the server an SYN (synchronize) packet with a random number, which ensures that data is sent in the right order and nothing is missed.
- The server receives the packet and accepts the connection by sending an SYN-ACK (synchronize acknowledgment) packet back to the client, including the client’s sequence number plus 1. It also transmits its own sequence number to the requesting client.
- Finally, the client acknowledges the receipt of the SYN-ACK segment by sending its own ACK packet, which in this case contains the server’s sequence number plus 1. At the same time, the client can already begin transferring data to the server.
What is User Datagram Protocol (UDP)?
a protocol that allows datagrams to be sent without connection in IP-based networks. To achieve the desired services on the target hosts, it uses ports that are listed as one of the core components in the UDP header.
How is UDP connectionless?
it takes place without an existing connection between addressee and recipient. The respective packets are then sent to the preferred IP address, specifying the target port, without the computer behind them having to respond. However, if packets are also to be returned to the recipient, the UDP header can optionally also contain the source port.