Introduction- Security Concepts Flashcards

1
Q

Primary 3 Goals of Network Security

A

Confidentiality
Integrity
Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Confidentiality

A

Encryption

Only Authorized Users can access assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Integrity

A

No one modifies your information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Availability

A

Network must be available.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Physical Threats

A

Fire, water, earthquake
Electrical
Lack of Spare Parts
Poor cabling/labeling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Internal Threats

A

User has physical access and knowledge of the internal network.
Locks, Cameras, ID access, Data backups

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Value Classifications. 5

A
Confidentiality
Value
Age
Replacement Cost
Useful Lifetime
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Countermeasures 3

A

Administrative Controls
Physical Controls
Technical/Logical Controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Administrative Control

A

Policy/Procedure

Training, Standards, change management, audits, background checks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Physical Controls

A

Security Guard, IDS, Locks, UPS, Fire Suppression

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Vulnerabilities 4

A

Protocols
Operating Systems
Application
System Design

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Network Security Policy

A

Rules for individuals and groups throughout the company
Access Control
Guide for Network security Engineer to configure, change, monitor, Log, and respond to attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Network Segmentation

A

Separate network by where devices are physically connected as well as VLANs
Group assets of the same type, value, security level, or risk level

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Separation of Duties

A

No single individual has the capability to execute a set of tasks
More than one person required to complete a task

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Weakest Link

A

Humans are the weakest link

Weak passwords or humans kindness attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Accountability and Non-repudiation

A

User activity and changes are logged and audited

Guarantees all operations can be traced to source