Network Security Flashcards
What are the components of the Confidentiality, Integrity, Availability (CIA) triad?
The components of the Confidentiality, Integrity, Availability (CIA) triad are confidentiality, integrity, and availability, which are the three core principles of information security.
What are internal threats?
Internal threats are security risks originating from within the organization, such as employees or contractors.
What are external threats?
External threats are security risks originating from outside the organization, such as hackers or competitors.
What are common vulnerabilities and exposures (CVE)?
Common vulnerabilities and exposures (CVE) are publicly disclosed security vulnerabilities in software and hardware.
What is a zero-day vulnerability?
A zero-day vulnerability is a security flaw that is unknown to the vendor and has no available fix, making it highly exploitable.
What are exploits?
Exploits are techniques or code used to take advantage of vulnerabilities in systems or applications.
What is the principle of least privilege?
The principle of least privilege means granting users only the access necessary to perform their job functions, reducing the risk of unauthorized access.
What is role-based access control?
Role-based access control is a method of restricting access to resources based on the roles of individual users within an organization.
What is Zero Trust security?
Zero Trust security is a model that assumes no implicit trust and requires continuous verification of every user and device attempting to access resources.
What is defense in depth?
Defense in depth is a layered security approach that uses multiple defenses to protect systems and data.
What is network segmentation enforcement?
Network segmentation enforcement is the practice of dividing a network into segments to control traffic and limit access based on policy.
What is a perimeter network (previously known as demilitarized zone or DMZ)?
A perimeter network, previously known as a demilitarized zone (DMZ), is a buffer zone between an internal network and the external internet, used to host public-facing services.
What is the separation of duties?
Separation of duties is a security principle that divides responsibilities among different individuals to reduce the risk of fraud or error.
What is network access control?
Network access control is a security technique used to restrict network access to authorized users and devices.
What is a honeypot?
A honeypot is a decoy system or network set up to attract and analyze potential attackers.