Network Security Flashcards
1
Q
What is CIA Triad?
A
- Confidentality, Integrity, and Availability
- A model that combines three principles of information security to help organizations protect their sensitive systems and information
2
Q
What is Confidentality?
A
- Keeping data private and safe
- Symmetrical Encryption & Asymmetrical Encryption
- Steganography
- Access Control Methods
3
Q
What is Symmetrical Encryption?
A
- Sender and Recipient use same keys
- Data Encryption Standard (DES) - Weak
- Triple DES
- Advanced Encryption Standard (AES) - WPA2 in 128, 192, 256 bits
4
Q
What is Asymmetrical Encryption?
A
- Sender and Recipient use different keys
- RSA algorithm
- Common use with Public Key Infrastructure
- Can be in secure emails
5
Q
What is Integrity?
A
- Ensure data has not bee modified in transit
- Hashing Algorithms
6
Q
What is Availability?
A
- Ensures data accessibility
- Redundancy
- Fault Tolerance
- Load Balancing
- Patch Management
7
Q
What is Confidentiality Attack?
A
Attempt to make data viewable by attacker
8
Q
What is Integrity Attack?
A
Attempt to alter data
9
Q
What is Availability Attack?
A
Attempt to limit network accessibility and usability
10
Q
What is TACACS+?
A
- Terminal Access Controller Access Control System Plus (TACACS+) under TCP
- Perform the role of an authenticator in an 802.1x network
- Encrypts the entire payload of the access-request packet
- Primarily used for device administration
- Separates authentication and authorization
11
Q
What is RADIUS?
A
- Remote Authentication Dial-In User Service (RADIUS) under UDP
- Provides centralized administration of dial-up, VPN, and wireless network authentication
- Encrypts only the password in the access-request packet
- Combines authentication and authorization (802.1x)
- Primarily used for network access
12
Q
What is NAC?
A
- Network Access Control (NAC)
- A concept of effective security posture employing multiple tools and different techniques to slow down an attacker
- Time-based, Location-based, Role-based, Rule-based.
13
Q
What is CVE?
A
- Common Vulnerabilities and Exposures (CVE)
- List of publicly disclosed vulnerabilities – known vulnerabilities
14
Q
What is Zero Day?
A
- Newly discovered vulnerabilities - A type of attack aimed at exploiting vulnerability that is present in already released software but unknown to the software developer
15
Q
What is DLP?
A
- Data Loss Policy
- A document defining how organizations can share and protect data