Module 01: Network Security Fundamentals- Flashcards
Process of protecting information systems or networks that store sensitive data, to make them available for the end users whenever they request access.
Information Assurance Principle of Availability
Process of authorizing users with credentials provided, by comparing them to those in a database of authorized users on an authentication server, to grant access to the network. It guarantees that the files or data phasing through the network is safe.
Information Assurance Principle of Authentication
Protects data and does not allow modification, deletion, or corruption of data without proper authorization.
Information Assurance Principle of Integrity
A service that validates the integrity of a digital signature’s transmission, starting from where it originated to where it arrived.
Information Assurance Principle of Non-repudiation
Permits only authorized users to access, use or copy information. Authentication is crucial for confidentiality. If an authorized user accesses protected information, it implies that a breach of confidentiality has occurred.
Information Assurance Principle of Confidentiality
This approach consists of methods or techniques that are used to inform decision making for countering future attacks on the target network. Threat intelligence and risk assessment are examples of methods that can be used to assess probable future threats on the organization.
Proactive Approach
Essentially consists of methods or techniques that can easily prevent threats or attacks in the target network. Firewall, NAC and NAP, and IPSec and SSL are examples of this approach.
Preventative Approach
Examines the causes for attacks in the network. These include: Fault finding mechanism such as protocol analyzers and traffic monitors, Security forensics techniques such as CSIRT and CERT, Post-mortem analysis mechanism including risk and legal assessments.
Retrospective Approach
This approach address attacks and threats that the preventative approach may have failed to avert. DoS and DDoS attacks are examples of the reactive approach. It is necessary to implement both preventative and this approach to ensure the security of the network. This includes security monitoring methods such as IDS, SIMS, TRS, and IPS.
What is the Reactive Approach?
Ensures that only users with appropriate privileges can access the system or network resources.
Authentication and Authorization
Used for the restriction of access to data according to sensitivity of data, clearance level of users, user rights, and permissions.
System Access Controls
Refers to the tracking and examining of the actives of network devices in a network. This mechanism helps in identifying weaknesses in the network.
Auditing
Protects the information passing through the network and preserve the privacy and reliability of the data.
Encryption and Protocols
Firewall and IDS are used to filter and detect malicious traffic, thus protecting the organization from threats.
Network Security Devices
Provides access to the resource indirectly. A task is possible after a user receives authorization for a primary resource through which access to the requested resource is possible.
Implicit Authorization