Network Flashcards
What is Firewalls?
Acts as a gatekeeper to enforce access policies between networks, deciding which traffic should be allowed or blocked based on predefined rules. It can operate at various levels of the OSI model, often at the network or application layer.
What is IDS
Does not block traffic; it monitors network traffic to detect suspicious activities and potential threats. It then alerts the system administrators without actively intervening.
TCP
Transmission - Manages data transmission.
Control - Controls how data packets are sent.
Protocol - Protocol suite for the internet.
IP
Internet Protocol handles the addressing and routing of packets to ensure they reach the right destination. Every device connected to the internet has at least one IP address.
Differences between HTTP & HTTPS
HyperText Transfer Protocol is the foundation of data communication for the World Wide Web. It defines how messages are formatted and transmitted, and how web servers and browsers should respond to various commands.
HTTPS (HyperText Transfer Protocol Secure) is an extension of HTTP that uses encryption (SSL/TLS) to secure communications between a user’s browser and a web server. This is crucial for protecting sensitive data during transmission.
Cryptography (Keyword: “Secrets”)
Mnemonic: “KEYS”
Keys - Emphasizes the use of cryptographic keys.
Encryption - The process of converting data into a secure format.
Yield - The resulting secure data that can only be accessed with a key.
Secure - The overall goal of cryptography to secure data.
Symmetric encryption
Uses the same key for both encryption and decryption (fast but requires safe key distribution).
Asymmetric encryption
Uses a pair of keys (public and private) where the public key encrypts and the private key decrypts (safer for distribution but slower).
Incident Response (Keyword: “RIDERS”)
Incident response is the organized approach to managing the aftermath of a security breach or attack.
Recognition - Identifying a security incident.
Investigation - Investigating how the breach happened.
Documentation - Keeping records of the incident and the response.
Eradication - Removing the threat from the system.
Recovery - Restoring and confirming system functionality.
Summary - Reviewing and learning from the incident.
How does compliance with regulations like GDPR impact the day-to-day operations of a cybersecurity team
mnemonic “LAW”
Legal requirements could include laws like GDPR, HIPAA, or PCI-DSS, which dictate how organizations must protect data.
Audit refers to the regular reviews and checks that ensure compliance with these legal requirements.
Watchfulness means maintaining ongoing vigilance to adapt to new legal standards and compliance requirements.
Can you describe the differences between symmetric and asymmetric encryption and give an example of when each might be used
Symmetric encryption uses the same key for both encryption and decryption, which makes it faster and more efficient for processing large volumes of data. For example, AES (Advanced Encryption Standard) is widely used for encrypting files and database information due to its speed and security.
Asymmetric encryption, on the other hand, uses a pair of keys—one public and one private. The public key can be shared with anyone, while the private key is kept secret. This type of encryption is ideal for secure communications over insecure channels, such as the internet. A typical use case is the SSL/TLS protocol, which uses asymmetric encryption to establish a secure session over the web. It allows websites to secure sensitive user data during transmission, such as credit card information and login credentials.”
How does compliance with regulations like GDPR impact the day-to-day operations of a cybersecurity team
Compliance with GDPR significantly impacts daily operations in several ways. First, it requires that we implement data protection ‘by design and by default.’ This means that any new system or process we develop must consider privacy from the outset, requiring regular privacy impact assessments.
Additionally, GDPR mandates the rights of data subjects, such as access to their data and the right to be forgotten. Our team must have processes in place to quickly respond to such requests.
We also need to ensure that any data breaches are reported to regulatory authorities and affected individuals within 72 hours of discovery, which requires us to have robust detection and reporting mechanisms in place.
Finally, maintaining compliance involves continuous education and training for our team and regular audits to ensure all our practices and systems remain in compliance with the evolving landscape of privacy laws.
What are the main security measures you would recommend for a network that frequently transmits sensitive data over the Internet
For a network that transmits sensitive data, I recommend:
Encryption: Use strong encryption protocols like TLS for data in transit to protect against eavesdropping.
Firewalls and IDS/IPS: Deploy firewalls to control traffic and use intrusion detection and prevention systems to monitor for and respond to malicious activities.
VPN: Implement VPNs for secure remote access, ensuring that data remains encrypted even over public networks.
Regular Audits: Conduct security audits and vulnerability assessments regularly to identify and mitigate potential risks
What steps would you take to secure a new IoT device being introduced into a corporate environment
“To secure a new IoT device, I would:
Segmentation: Place IoT devices on a separate network segment to limit access and reduce the risk of lateral movement in case of compromise.
Update Management: Ensure the device firmware and software are up-to-date to mitigate known vulnerabilities.
Strong Authentication: Enforce strong authentication mechanisms to control access to the device.
Continuous Monitoring: Implement continuous monitoring to detect unusual behavior indicative of a security breach.”
What steps do you take in the risk management process, and how do you prioritize which risks to address first
Mnemonic: “RAMP”
Recognize: Identify risks through assessments.
Assess: Evaluate the likelihood and impact of risks.
Mitigate: Implement strategies to reduce or manage risks.
Periodically Review: Continuously monitor and update risk management strategies