Section 4: Network Security Flashcards
What is the difference between data in transit and data at rest encryption?
Data in Transit: Encryption applied to data as it moves across networks (e.g., HTTPS, VPN).
Data at Rest: Encryption applied to stored data (e.g., database encryption, encrypted hard drives).
What are the types of certificates, and how do they function?
Public Key Infrastructure (PKI): Certificates issued by trusted Certificate Authorities (CAs) to enable secure communications.
Self-Signed Certificates: Certificates generated without a CA; suitable for internal or non-critical use.
What is IAM, and what are its key components?
Identity and Access Management
Key Components:
* Authentication: Verifying a user’s identity (e.g., passwords, biometrics).
* Multifactor
Authentication Multifactor
Authentication (MFA): Combines two or more authentication methods (e.g., password + SMS code).
* Single Sign-On (SSO): Enables one login to access multiple systems.
* Time-Based Authentication: Uses temporary codes (e.g., TOTP) for enhanced security.
* Authorization: Defines what actions a user is allowed to perform.
* Least
Privilege: Grants users only the access necessary for their roles.
* Role-Based Access Control (RBAC): Assigns permissions based on user roles.
What is geofencing, and how is it used in security?
- Uses geographic boundaries (e.g., GPS, IP address) to control access or trigger alerts.
- Common in physical and network security for location-based restrictions.
What are examples of physical security measures?
- Cameras: Monitor and record activity in sensitive areas.
- Locks: Restrict physical access to devices or facilities.
What are common protocols and tools used in IAM?
- RADIUS: Provides centralized authentication for remote users.
- LDAP: Accesses and manages directory information (e.g., user credentials).
- SAML: Enables Single Sign-On (SSO) by exchanging authentication data between services.
- TACACS+: Provides authentication and authorization for network devices.
What are deception technologies, and what are common examples?
Tools to detect and distract attackers by simulating vulnerabilities.
Honeypot: A decoy system designed to lure attackers.
Honeynet: A network of honeypots used to study attack patterns.
What is the difference between risk, vulnerability, exploit, and threat?
Risk: The potential for a negative outcome due to vulnerabilities.
Vulnerability: Weaknesses that can be exploited.
Exploit: The method used to take advantage of a vulnerability.
Threat: Anything that can cause harm, such as malware or attackers.
What are the core concepts of the CIA triad?
Confidentiality: Ensures data is accessible only to authorized users.
Integrity: Ensures data remains accurate and unaltered.
Availability: Ensures data and systems are accessible when needed.
What are common audits and regulatory compliance frameworks?
Data Locality: Ensures data storage complies with local regulations.
PCI DSS: Standards for securing payment card data.
GDPR: European Union regulation for data protection and privacy.
What is network segmentation enforcement, and what are its use cases?
Divides a network into segments to limit access and reduce risk.
Use Cases:
* IoT and IIoT: Protects devices from general network threats.
* SCADA/ICS/OT: Secures industrial control systems from cyberattacks.
* Guest Network: Isolates guest users to prevent access to sensitive resources.
* BYOD (Bring Your Own Device): Limits personal device access to specific network areas.
Internet of Things and Industria lIoT
What is a DoS attack?
- An attack designed to overwhelm a target system with traffic or requests, causing it to become unavailable.
- DDoS (Distributed DoS): Involves multiple systems (often botnets) attacking a single target to amplify the impact.
What is VLAN hopping, and how does it work?
Exploits misconfigured VLANs to send traffic to unauthorized VLANs.
Methods:
* Switch Spoofing: Attacker pretends to be a trunk port.
* Double Tagging: Inserts extra VLAN tags in packets to bypass security.
What is MAC flooding, and what is its impact?
- Overloads a switch’s MAC address table with fake addresses.
- Forces the switch to broadcast all traffic, exposing sensitive data and degrading performance.
What is ARP poisoning, and how does it differ from ARP spoofing?
Address Resolution Protocol
ARP Poisoning: Manipulates ARP tables to associate an attacker’s MAC address with a legitimate IP address.
ARP Spoofing: A technique used to perform ARP poisoning by sending forged ARP messages.