Lecture 5 Flashcards
What are the four types of threats that might arrive when a hacker gains access to the network?
Information Theft
Identity Theft
Data Loss / Manipulation
Disruption of Service
What are the network security goals?
Confidentiality
Authentication
Message Integrity
Access and Availability
What is the CIA Triangle made up of?
Confidentiality
Integrity
Availability
What is McCumber’s cube made up of?
Security Principles:
Confidentiality
Integrity
Availability
Information States:
Transmission
Storage
Processing
Countermeasures:
Technology
Policies & Practice
People
What does AAA stand for?
Authentication - verifies the ID of the user.
Authorization - Determines what resources an authenticated person is allowed to access.
Accounting - Keeps track of what the user is doing.
What is DAS?
Direct-Attached Storage, a USB or HDD.
What is NAC?
Network access control.
What is VPN?
Virtual Private Network
What is a DMZ?
Demilitarized Zone which allows for an internal server to be accessed from both internal and external networks. All inbound traffic is forwarded to this device.