Chapter 1 Flashcards
What is Network Security?
The collection of security components assembled in a network to support secure internal and external communications. Network security depends upon host security. Network security operates to protect the network as a whole, rather than as individual systems.
What is trust?
Confidence in the expectation that others will act in your best interest, or that a resource is authentic. On computer networks, trust is the confidence that other users will act in accordance with the organization’s security rules and not attempt to violate stability, privacy or integrity of the network and its resources.
Who or What is Trustworthy?
Known quantities, trust builds over time through correct actions
Why should you care about Network Security?
Who is responsible for Network Security?
What does a Common network look like?
What do common network attacks look like?
MITM, Hijacking, Replay
Access Control
The process or mechanism of granting or denying use of a resource; typically applied to users or generic network traffic.
Appliance
A hardware product that is dedicated to a single primary function. The operating system or firmware of the hardware device is hardened and its use is limited to directly and exclusively supporting the intended function. Firewalls, routers, and switches are typical appliances.
Asset
Anything you use in a business process to accomplish a business task.
Auditing
Act of conducting an audit. Auditing can be the action of a system that is recording user activity and system events into an audit log. Auditing can also be the action of an auditor who checks for compliance with security policies and other regulations
Auditor
Either an outside consultant or an internal member of the information technology staff. The auditor performs security audits, confirms that auditing is sufficient, and investigates audit trails produced by system auditing. In the case of regulatory compliance, auditors should be external and independent of the organization under audit.
Authentication
The security service of the combination of authentication and access control (authorization) that provides either the identity of the sender of a message or controls who is the receiver of a message.
Authorization
Defining what users are allowed and not allowed to do. Also known as access control.
Availability
When a system is usable for its intended purpose. The security service that supports access to resources in a timely manner. If avail-ability becomes compromised, a denial of service is taking place.
Backdoor
Unauthorized access to a system. A backdoor is any access method or pathway that circumvents access or authentication mechanisms.
Blacklist
A type of filtering in which all activities or entities are permitted except for those on the blacklist. Also known as a block list.
Bottleneck
Any restriction on the performance of a system. Can be caused by a slower component or a pathway with insufficient throughput. A bottle-neck causes other components of system to work slower than their optimum rate.
Breach
Any compromise of security. Any violation of a restriction or rule whether caused by an authorized user or an unauthorized outsider.
Bridge
A network device that forwards traffic between networks based on the MAC address of the Ethernet frame. A bridge forwards only packets whose destination address is on the opposing network.
Business Task
Any activity necessary to meet an organization’s long-term goals. Business tasks are assigned to employees and other authorized personnel via their job descriptions.
Caching
Retention of Internet content by a proxy server. Various internal clients may access this content and provide it to subsequent requesters without the need to retrieve the same content from the Internet repeatedly.
Chokepoint
Similar to a bottleneck, but deliberately created within a network infrastructure. A chokepoint is a controlled pathway through which all traffic must cross. At this point, filtering to block unwanted communication or monitoring can occur.
Client
A host on a network. A client is the computer system, which supports user interaction with the network. Users employ a client to access resources from the network. Users can also employ a client generically as any hardware or software product to access a resource. For example, standard e-mail software is a client.