Network Security Flashcards
What is the CIA triad?
Confidentiality - only those who are supposed to access the data can access it.
Integrity - the data there is only changed when it’s supposed to be
Availability - the data is there when it is needed
What is authentication?
You are who you say you are.
What is authorization?
You are where you’re supposed to be.
What is accounting?
Professionals sometimes call this logging. This means that everything you do is properly noted, and any changes to data can be tied to a user account.
What is a network security key?
The network security key is your network’s equivalent to a shut and locked door, with the password acting as a key for entry. If you don’t protect your wireless network with a strong password, someone can get into the devices on your network (access files on your computer) or use your Internet connection.
What is WEP?
WEP (Wired Equivalent Privacy) is an older protection method that was designed to provide a similar level of protection to wireless network traffic as is provided in a wired network.
What is WPA?
WPA (Wi Fi Protected Access) is a newer protection method than WEP and provides a higher level of encryption and authentication (a shared greeting procedure used to verify identity)
What is WPA2?
WPA2 is the latest version of WI-FI Protected Access and is standard on most network devices today. WPA2 can use two different forms of encryption: AES (Advanced Encryption Standard) or TKIP (Temporal Key Integrity Protocol). AES offers the stronger encryption of the two.
What is non-repudiation?
the ability to ensure that someone cannot deny or contest that thing.
What is a computer virus?
A computer virus is a software program downloaded to your network then executing without your knowledge.
Blended Threats
A combination of several different approaches using a variety of malware elements generating multiple forms of viruses, worms and Trojan horses.
Botnet
A group of computers pirated by a hacker. The pirated computers are referred to as zombies. Zombies can then be combined and used to saturate a network causing a Denial of Service attack.
Computer worm
Malware that copies itself from one computer to another, without human interaction. Worms replicate themselves quickly and have been known to send copies of itself to people in your address book.
Malicious spyware
Records keystrokes and periodically sends the recorded information back to the originating cyber criminal using the internet and making the information available for further exploitation.
Malware
Malware is short for ‘malicious software.’ Always hostile, intrusive, and annoying. Takes various forms such as a virus, worm, and a Trojan horse to name a few.