Network Security Concepts and Policies Flashcards
How can unauthorized access by a hacker to a company’s information hurt that company?
1) It can cause damage or destruction to proprietary data
2) It can negatively affect company productivity
3) It can impede the capability to compete
4) It can harm relationships with customers and business partners who question the capability of the company to protect it’s confidential information.
Though Individuals and corporations benefit from the elastic deployment of services in the cloud, what have these dramatic changes in business services done?
They have exacerbated the risks in protecting data and the entities using it (Individuals, businesses, governments, etc).
What are four (4) things to consider when planning network security?
1) Examine the need for security
2) Look at what you are trying to protect
3) Examine the different trends for attacks and protection
4) Examine principles of secure network design
As companies move more of their business functions to the public network what should they do?
There is a need for them to take precautions to ensure that:
1) the data cannot be compromised
2) The data is not accessible to anyone who is not authorized to see it.
What are the Basic Security Assumptions?
1) Modern networks are very large, interconnected and run both ubiquitous and proprietary protocols. Therefore, they care often open to access, and a potential attacher can with relative ease attach to, or remotely access, such networks. Widespread IP inter-networking increases the probability that more attacks will be carried out over large, heavy interconnected networks such as the internet.
2) Computer systems and applications that are attached to these networks are becoming increasingly complex. In terms of security, it becomes more difficult to analyze, secure, and properly test the security of the computer system and applications. It is even more so when virtualization is involved. When these systems and their applications are attached to the large network, the risk to computing dramatically increases.
What are the three (3) things that must be guaranteed in order to provide adequate protection of network resources?
1) Confidentiality - guarantees that only authorized users can view sensitive information.
2) Integrity - guarantees that only authorized users can change sensitive information and provides a way to detect whether data has been tampered with during transmission; this might also guarantee authenticity of data.
3) Availability of systems and data - provides uninterrupted access by authorized users to important computing resources and data.
When designing network security what are the 4 things a designer must be aware of?
1) The threats (possible attacks) that could compromise security
2) The associated risks of the threats (how relevant those threats are for a particular system)
3) The cost to implement the proper security countermeasures for a threat
4) A cost vs benefit analysis to determine whether it’s worthwhile to implement the security countermeasure.
True or false?
Although viruses, worms and hackers monopolize the headlines about information security, risk management is the most important aspect of security architecture for administrators.
True
Risk management is based on specific principles and concepts that are related to asset protection and security management.
What is an asset?
An asset is something of value to an organization.
By knowing which assets you are trying to protect, as well as their value, location, and exposure, you can more effectively determine the time, effort, and money to spend in securing those assets.
What is a vulnerability?
It is a weakness in a system or it’s design that could be exploited by a threat.
Vulnerabilities can be found in protocols, operating systems, applications, written security policies, etc
What is a threat?
A threat is any potential danger to assets. It is realized when someone or something identifies a specific vulnerability and exploits it, creating exposure.
A latent threat is one that exists theoretically but has not yet been exploited.
The entity that takes advantage of the vulnerability is known as a threat agent or threat vector.
What is a risk?
A likelihood that a particular threat using a specific attack will exploit a particular vulnerability of a system that results in an undesirable consequence.
If you have A vulnerability but there is no threat toward the vulnerability, technically you have no risk.
If you have a vulnerability but there is no threat toward the vulnerability, technically you have no risk.
What is an exploit?
An Exploit is an attack performed against a vulnerability
What is a countermeasure?
A countermeasure is a safeguard/protection that mitigates the potential risk.
What kind of data has little or no confidentiality, integrity or availability requirements and therefore little effort is made to secure it.
Unclassified Data
What kind of data if leaked could have undesirable effects on the organization?
Restricted data.
This classification is common among NATO countries but not used by all nations.
What kind of data must comply with confidentiality requirements
Confidential Data. It is the lowest level of classified data in this scheme.