Network Security Flashcards

1
Q

Why is Network Security important?

A

It ensures the protection of networks against threats like unauthorized access, data breaches, and attacks.
The human factor is often the weakest link in security, as careless users can compromise even robust systems.
Example: Poor password practices (e.g., “marge123”).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are key Security Terminologies in networking?

A

Authentication: Verifies the identity of a client or entity.
Encryption: Protects data by converting it into an unreadable format.
Public Key: A key used in encryption that is publicly available.
Private Key: A confidential key used in encryption processes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How does Authentication with IPSec work?

A

IPSec secures IP datagrams by providing authentication features.
Authentication Headers (AH): Bind the sender to the message.
Message Digests: Ensure data integrity, created using algorithms like SHA-1 or MD5.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How does Public Key Encryption work?

A

Bi-Directional Usage: Data encrypted with a private key can only be decrypted with the corresponding public key and vice versa.
Applications:
*Authentication: Sender encrypts with their private key to verify identity.
*Confidentiality: Sender encrypts with the recipient’s public key to ensure privacy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Encryption in IPSec?

A

Encapsulating Security Payload (ESP): Encrypts the data portion of a datagram, commonly used in VPNs for secure communication.
VPN Integration: IPSec ESP helps maintain data security in VPN connections.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are some Web Security Threats?

A

Integrity: Modification or destruction of data.
Confidentiality: Unauthorized access to private data.
Denial of Service (DoS): Disruption of service availability.
Unchecked Code: Exploiting user inputs (e.g., JavaScript or SQL injection).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a Denial of Service (DoS) attack?

A

A DoS attack overloads resources like servers or memory, causing service disruptions.
Example: Nimbda virus, which uses incoming requests to propagate itself.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are some Secure Coding Practices?

A

Validate user inputs using positive validation (check for expected formats) and negative validation (check for malicious code like

 tags).
Sanitize inputs to prevent unchecked code attacks.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are Encryption Techniques?

A

Single Key Encryption: Uses the same key for both encryption and decryption (e.g., DES).
-Vulnerabilities: Key interception can compromise security.
Public Key Cryptography: Uses separate keys for encryption and decryption (e.g., RSA).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Secure Socket Layer (SSL)?

A

SSL provides encrypted communication over TCP connections.
It involves steps like exchanging certificates and public keys before starting secure communication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How is Email Security ensured?

A

PGP (Pretty Good Privacy): Encrypts emails using single or public key cryptography.
Virus Protection: Antivirus tools scan incoming emails for malicious attachments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are some examples of Malicious Programs?

A

Trap Door: Hidden entry points to systems.
Logic Bomb: Activated under specific conditions.
Trojan Horse: Appears as legitimate software but has malicious behavior.
Virus: Propagates through executable files.
Worm: Spreads through network connections.
Bacteria: Propagates without causing harm.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the Key Takeaways about network security?

A

Prevention is critical, such as regular updates to avoid vulnerabilities like the Code Red worm.
A robust security system combines encryption, authentication, input validation, and proactive defense.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly