Network Security Basics Flashcards

1
Q

Protection of computer systems and networks from theft / damage to hardware / software or electronic data

A

Computer Security / Cybersecurity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Protection of networks and underlying infrastructure

A

Network Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Assurance that network performs critical functions correctly

A

Network Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Protection of network devices such as routers and switches, and end systems

A

Device Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Hardware / software to limit access between network and device attached to network, according to policy

A

Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Hardware / software to gather analyze info from various areas within computer or network

A

Intrusion detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
  • Requires constant monitoring
  • All potential attacks need to be considered
  • Often an afterthought
A

Security Challenges

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Eavesdropping on, or monitoring of, transmissions

A

Passive attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Goal of opponent is to obtain information being transmitted

A

Passive attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
  • Release of message contents
  • Traffic analysis
A

Passive attack types

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Modifying the data stream or creation of a false stream

A

Active attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Difficult to prevent because of large attack surface

A

Active attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Goal is to detect attacks and recover

A

Active attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

One entity pretending to be another entity

A

Masquerade

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Passive capture of a data unit and subsequent retransmission to produce unauthorized effect

A

Replay

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Parts of message are altered or delayed to produce unauthorized effect

A

Data modification

17
Q

Prevent or inhibit normal use or management of communication facilities

A

Denial of service

18
Q

Protection of transmitted data from passive attack

A

Data confidentiality

19
Q

Protection of traffic flow from analysis

A

Data confidentiality

20
Q

Applicable to stream of messages, single message, or selected fields in a message

A

Data integrity

21
Q

Connection-oriented: no messages sent with duplication, insertion, etc.

Connection-less: protect again message modification alone

A

Data integrity

22
Q

Protect a system to ensure availability

A

Availability service

23
Q

Service addresses concerns raised by DoS

A

Availability service

24
Q

Concerns with assuring a communication is authentic

A

Authentication

25
Q

Single message: assure recipient that message from source is who it claims to be from

Ongoing interaction: assure two entities are authentic and connection has no masquerading

A

Authentication

26
Q

Ability to limit and control access to host systems

A

Access control

27
Q

Prevent sender or receiver from denying a transmitted message

A

Nonrepudiation

28
Q
A