Network security Flashcards
What do C, I and A stand for in CIA triad
Confidentiality, Integrity and Accessibility. All important part of any network system and it’s security
What are WEP, WPA, WPA2 and WPA3?
Wi-Fi encryption protocols
What networking model does SSH use?
client-server model
How can a SSH connection be authenticated?
Username + password, key or both
How can one get a SSL/TLS certificate?
From a Trusted Rood Certification Authority, such as Let’s Encrypt
What are VPN’s used for?
They’re used for establishing a secure connection to private remote network over public networks. VPNs also reroute all network traffic, which can help to hide the user’s identity, including the physical location. Other uses are bypassing geolocational restrictions, accessing blocked or censored websites, preventing ISP form tracking you and improved security when connecting to the internet from insecure, public networks