Section 13: Network Security Flashcards

1
Q

CIA Triad

A

Confidentiality, Integrity, Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Confidentiality

A

▪ Keeping the data private and safe using
● Encryption
- Symmetric - Both sender and receiver use the same key
- Asymmetric - Uses different keys for sender and receiver
● Authentication to access resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Integrity

A

▪ Ensures data has not been modified in transit
▪ Verifies the source that traffic originates from

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Availability

A

▪ Measures accessibility of the data
▪ Increased by designing redundant networks
▪ Compromised by: Crashing a router or switch, Denial of Service (DoS), Distributed Denial of Service (DDOS) attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Confidentiality: Symmetric Encryption Standard DES

A

▪ Data Encryption Standard - weak by today’s standards
● 56-bit key
● Used by SNMPv3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Confidentiality: Symmetric Encryption Standard 3DES

A

▪ Triple DES
● Uses three 56-bit keys (168-bit total)
● Encrypt, decrypt, encrypt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Confidentiality: Symmetric Encryption Standard AES

A

▪ Advanced Encryption Standard
● Preferred symmetric encryption standard
● Used by WPA2
● Available in 128-bit, 192-bit, and 256-bit keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Confidentiality: Asymmetric Encryption Standard

A

▪ Uses different keys for sender and receiver
▪ RSA is the most popular implementation
▪ RSA algorithm is commonly used with a public key infrastructure (PKI)
▪ PKI is used to encrypt data between your web browser and a shopping website
▪ Can be used to securely exchange emails
▪ Sender and receiver use different keys to encrypt and decrypt the messages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Integrity: Hashing

A

▪ Sender runs string of data through algorithm
● Result is a hash or hash digest
▪ Data and its hash are sent to receiver
▪ Receiver runs data received through the same algorithm and obtains a hash
▪ Two hashes are compared
● If the same, the data was not modified

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Integrity: Hashing Algorithms

A

▪ Message Digest 5 (MD5) - 128-bit hash digest
▪ Secure Hash Algorithm 1 (SHA-1) - 160-bit hash digest
▪ Secure Hash Algorithm 256 (SHA-256) - 256-bit hash digest
▪ Challenge-Response Authentication Mechanism Message Digest 5 (CRAM-MD5) - Common variant often used in e-mail systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Threats

A

Internal - originates within the organization
External - external to the organization (Hackers, mother nature,…)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Vulnerabilities

A

Environmental - .Fire, Hurricane,…
Physical - Inadequate physical controls
Operational - Deficient policies/procedures.
Technical - System-specific conditions that create security weaknesses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

CVE

A

Common Vulnerabilities and Exposures - A list of publicly disclosed computer security weaknesses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Zero-Day Vulnerability

A

Any weakness in the system design, implementation, software code, or a lack of preventive mechanisms in place

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Risk Management

A

The identification, evaluation, and prioritization of risks to minimize, monitor, and control the vulnerability exploited by a threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Security Principal: Least Privilege

A

▪ Lowest level of permissions or privileges needed in order to complete a job function or admin task

17
Q

Security Principal:

A
18
Q

Security Principal:

A