Chapter 8 Network Security Analysis Flashcards
Security Factors:
is the process of determining what rights and privileges a particular entity has.
Authorization or Authentication
Security Factors:
is the process of determining and assigning privileges to various resources, objects, or data.
Access Control
Security Factors:
is the process of determining who to hold responsible for a particular activity or event, such as a logon
Accountability
Security Factors:
is the process of tracking and recording system activities and resource access.
Auditing or Accounting
Components of the CIA Triad:
Confidentiality- This is the fundamental principle of keeping information and communications private and protecting them from unauthorized access.
Integrity- This is the property of keeping organizational information accurate, free of errors, and without unauthorized modifications.
Availability- This is the fundamental principle of ensuring that systems operate continuously and that authorized persons can access the data that they need. Consider what would happen if the Federal Aviation Administration’s air traffic control system failed.
Basic Security Concepts:
is the goal of ensuring that data remains associated with the party that creates it or sends a transmission with that data
Non-repudiation
Basic Security Concepts:
dictates that users and software should have only the minimal level of access that is necessary for them to perform their duties.
Least Privilege
Basic Security Concepts:
is a concept that indicates exposure to the chance of damage or loss. It signifies the likelihood of a hazard or threat occurring. often associated with the loss of data, device, power, or network, and other physical losses.
Risks
Basic Security Concepts:
is a security incident in which sensitive, protected, or confidential data is copied, transmitted, viewed, stolen, or used by an individual unauthorized to do so.
Data Breaches
Basic Security Concepts:
is any type of network or data access that is not explicitly approved by an organization.
Unauthorized Access
is any condition that leaves a network open to attack
Vulnerabilities
Examples of Vulnerabilities
Improperly configured or installed hardware or software
Bugs in software or operating systems
Misuse of software or communication protocols
Poorly designed networks
Poor physical security
Insecure passwords
Design flaws in software or operating systems
Unchecked user input
Unlocked workstations
Taking advantage of a vulnerability. the attacker first identifies vulnerabilities and then takes advantage of that vulnerability to perform the attack. A few examples include taking advantage of open ports, unsecured accounts, or holes in applications or operating systems.
Exploits
an event or action that could potentially result in the violation of a security requirement, policy, or procedure.
Threats
a technique that is used to exploit a vulnerability in any application on a device without the authorization to do so.
Attacks
are related terms for individuals who have the skills to gain access to computing devices through unauthorized or unapproved means.
Hackers and Attackers
is a hacker who discovers and exposes security flaws in applications and operating systems so that manufacturers can fix them before they become widespread problems
White Hat
is a hacker who discovers and exposes security vulnerabilities for financial gain or for some malicious purpose
Black Hat
Examples might include logs of addition, deletion, or modification of an asset. occurs when you review those log files to find out what is occurring on the system.
Auditing and Logging
is a formalized statement that defines how security will be implemented within a particular organization.
Security Policy
Defines the acceptable use of an organization’s physical and intellectual resources.
Acceptable Use Policy (AUP)
Defines the circumstances under which personal devices including cell phones, tablets, and laptops may be connected to the organization’s network
Bring Your Own Device (BYOD)
Legal document between two parties that specifies restrictions on sharing any confidential or proprietary information with outside parties.
Non-Disclosure Agreement (NDA)
Identifies the actions to take when an incident occurs and how to respond to the incident.
Incident Response Policies (IRP)
Security Policy Components:
- Policy Statement- Outlines the plan for the individual security component.
- Standards- Define how to measure the level of adherence to the policy.
- Guidelines- Suggestions, recommendations, or best practices for how to meet the policy standard.
- Procedures- Step-by-step instructions that detail how to implement components of the policy.
Physical Security Threats and Vulnerabilities:
- Internal- Happens internally, example could be a disgruntled employee.
- External- Examples include power failures from a power company.
- Natural- Examples include weather-related problems including tornadoes, hurricanes, snow storms and floods.
- Man-made- Can be internal or external. Can be accidental or intentional Example could be a backhoe operator may accidentally dig up fiber optic cables. Or a disgruntled employee could choose to dig up cables.