Section 13: Network Security Flashcards
What does CIA stand for?
Confidentiality, Integrity, Availability
What is Confidentiality?
Keeping the data private and safe, such as encryption or authentication to access resources
What is Integrity?
Ensures data has not been modified in transit. It verifies the source that traffic originates from
What is Availability?
Measures accessibility of the data.
What is a Threat?
A person or event that has the potential for impacting a valuable resource in a negative manner
What is an Internal Threat?
Any threat that originates within the organization itself
What is an External Threat?
Any threat that could be, like a hacker, or it can be an event or environmental condition
What is a Vulnerability?
A quality or characteristic within a given resource or its environment that might allow the threat to be realized
What are Common Vulnerabilities Exposures (CVE)?
A list of publicly disclosed computer security weaknesses
What is a Zero-Day Vulnerability?
Any weakness in the system design, implementation, software code, or a lack of preventive mechanisms in place
What is an Exploit?
A piece of software code that takes advantage of a security flaw or vulnerability within a system or network
What is the Least Privilege?
Using the lowest level of permissions or privileges needed in order to complete a job function or admin task
What is a Role-Based Access Control?
An access model that is controlled by the system but focuses on a set of permissions versus an individual’s permissions
What is Zero-Trust?
A security framework that requires users to be authenticated and authorized before being granted access to applications and data
What is Defense in Depth?
A cybersecurity approach in which a series of defensive mechanisms are layered in order to protect valuable data and information
What is a Perimeter Network (DMZ)?
Protects an organization’s internal local area network from untrusted traffic
What is Separation of Duties?
Prevent frauds and abuse by distributing various tasks and approval authorities across a number of different users
What is the Network Access Control (NAC)?
Ensures a device is scanned to determine its current state of security prior to being allowed network access
What is a Honeypot?
Attracts and traps potential attackers to counteract any attempts at unauthorized access to a network
What is Risk Management?
The identification, evaluation, and prioritization of risks to minimize, monitor, and control the vulnerability exploited by a threat
What is a Security Risk Assessment?
Used to identify, assess, and implement key security controls within an application, system, or network
What is a Threat Assessment?
Focused on the identification of the different threats that may wish to attack or cause harm to your systems or network
What is a Vulnerability Assessment?
Focused on identifying, quantifying, and prioritizing the risks and vulnerabilities in a system or network
What is a Posture Assessment?
Assesses cyber risk posture and exposure to threats caused by misconfigurations and patching delays