Section 13: Network Security Flashcards
What does CIA stand for?
Confidentiality, Integrity, Availability
What is Confidentiality?
Keeping the data private and safe, such as encryption or authentication to access resources
What is Integrity?
Ensures data has not been modified in transit. It verifies the source that traffic originates from
What is Availability?
Measures accessibility of the data.
What is a Threat?
A person or event that has the potential for impacting a valuable resource in a negative manner
What is an Internal Threat?
Any threat that originates within the organization itself
What is an External Threat?
Any threat that could be, like a hacker, or it can be an event or environmental condition
What is a Vulnerability?
A quality or characteristic within a given resource or its environment that might allow the threat to be realized
What are Common Vulnerabilities Exposures (CVE)?
A list of publicly disclosed computer security weaknesses
What is a Zero-Day Vulnerability?
Any weakness in the system design, implementation, software code, or a lack of preventive mechanisms in place
What is an Exploit?
A piece of software code that takes advantage of a security flaw or vulnerability within a system or network
What is the Least Privilege?
Using the lowest level of permissions or privileges needed in order to complete a job function or admin task
What is a Role-Based Access Control?
An access model that is controlled by the system but focuses on a set of permissions versus an individual’s permissions
What is Zero-Trust?
A security framework that requires users to be authenticated and authorized before being granted access to applications and data
What is Defense in Depth?
A cybersecurity approach in which a series of defensive mechanisms are layered in order to protect valuable data and information
What is a Perimeter Network (DMZ)?
Protects an organization’s internal local area network from untrusted traffic