Network Security Flashcards
Advanced Encryption Standard (AES)
uses 128, 192, 256 bit keys
Threat
A person or event that has the potential for impacting a valuable resource in a negative manner
Vulnerability
A quality or characteristic within a given resource or its environment that might allow the threat to be realized
Internal Threat
originates within the organization (most of the time employees or former employees)
external threat
originates from outside the organization (hacker or environmental factor)
Physical Vulnerabilities
unlocked doors, etc.
Operational Vulnerabilities
Focuses on how the network and its systems are run from the perspective of an organization’s policies and procedures
Technical Vulnerabilities
system specific conditions like outdates stuff that causes a vulnerabilities
CVE
list of vulnerabilities
zero-day vulnerability
an unknown or new vulnerability that no one has discovered
Exploit
Takes advantage of a security flaw
Risk
Threats and vulnerabilities combined
Risk Assessment
identifies potential hazards
Posture Assessment
Assesses cyber risk posture and exposure to threats caused by misconfigurations and patching delays
Least Privilege
Only give what is necessary for the function