LESSON5 Flashcards
is the protection of the underlying networking
infrastructure from unauthorized access, misuse, or theft.
Network Security
involves creating a secure infrastructure for devices, users, and applications to work in a secure manner.
Network Security
Network security combines _______ at the edge and in the network.
multiple layers of defenses
Each network security layer implements ________.
policies and controls
_______ gain access to network resources, but ________ are blocked from carrying out exploits and threats.
Authorized users ; malicious actors
How does network security work?
- Network security combines multiple layers of defenses at the edge and in the network.
- Each network security layer implements policies and controls.
- Authorized users gain access to network resources, but malicious actors are blocked from carrying out exploits and threats.
- Is an organization’s set of rules regarding how to handle and protect sensitive data
(Ps A S R D W Phs)
Physical security
Acceptable use of applications
Safeguarding data
Remote access to the network
Data center
Wireless security
Protecting the Hardware and Software
- Malicious programs that have many different capabilities.
Malware
Types of Malware ( V W B P R R R T )
Virus
Worm
Botnets
Polymorphic
Ransomware
Remote Administration Tools (RATs)
Rootkits
Trojan
Programs that copy themselves throughout a computer or network.
- Virus –
Self-replicating viruses the exploits security vulnerabilities to automatically spread themselves across the computers and networks.
- Worm –
Short for “robot network,” these are networks of infected computers under the control of single attacking parties using command and control servers.
- Botnets –
Is a type of malware with the capacity to “morph” regularly, altering the appearance of the code while retaining the algorithm within.
- Polymorphic –
Is a criminal business model that uses malicious software to hold valuable files, data or information.
- Ransomware –
Software that allows a remote operator to control a system. These tools were originally built for legitimate use, but are now used by bad actors.
- Remote Administration Tools (RATs) –