Topic 1.4 - Network Security Flashcards
What is network security?
Network security refers to the measures and practices taken to protect computer networks and their data from unauthorized access and threats.
What is a threat in network security?
A threat is a potential danger or risk to the security of a network, which could result in harm or loss.
What is a vulnerability?
A vulnerability is a weakness or gap in a network’s defenses that can be exploited by threats to compromise security.
What is an attack in network security?
An attack is an intentional, harmful action against a network, aimed at exploiting vulnerabilities or causing damage.
What is a security breach?
A security breach is an unauthorized access or exposure of sensitive data within a network.
What is encryption in network security?
Encryption is the process of encoding data to make it unreadable to unauthorized users, providing confidentiality.
What is authentication?
Authentication is the process of verifying the identity of users or devices before granting access to the network.
What is authorisation?
Authorisation is the process of determining what actions or resources a user or device is allowed to access within the network.
What is intrusion detection and prevention?
Intrusion detection and prevention systems (IDPS) monitor network traffic for suspicious activity and can take actions to prevent or mitigate threats.
What is antivirus software?
Antivirus software is designed to detect and remove malware, such as viruses, worms, and Trojans, from a network.
What is a malware?
Malware is malicious software that includes viruses, worms, Trojans, and other harmful programs designed to disrupt or damage a network.
What is a DDoS attack?
A Distributed Denial of Service (DDoS) attack floods a network or server with traffic to overwhelm and disrupt services.
What is a phishing attack?
A phishing attack uses fraudulent emails or websites to trick users into revealing sensitive information, such as login credentials.
What is a man-in-the-middle attack?
A man-in-the-middle attack intercepts and potentially alters communications between two parties without their knowledge.
What is ransomware?
Ransomware is a type of malware that encrypts a network’s data and demands a ransom for the decryption key.
What is SSL/TLS?
SSL (Secure Sockets Layer) and TLS (Transport Layer Security) are protocols that provide secure data transmission over the internet, often used for securing websites.
What is IPsec?
IPsec (Internet Protocol Security) is a suite of protocols used to secure communication at the network layer, often used in VPNs.
What is SSH (Secure Shell)?
SSH is a secure network protocol that allows for secure remote access and file transfer over an encrypted connection.
What is WPA2/WPA3?
WPA2 (Wi-Fi Protected Access 2) and WPA3 are security protocols used to secure wireless networks, with WPA3 being the more recent and secure version.
What is the principle of least privilege?
The principle of least privilege advocates granting users or devices the minimum level of access necessary to perform their tasks, reducing potential security risks.
What is a security policy?
A security policy is a set of guidelines and rules that define how network security is managed and maintained within an organization.
What is a security audit?
A security audit is an evaluation of a network’s security measures to identify vulnerabilities and ensure compliance with security policies.
What is patch management?
Patch management involves applying updates and patches to network software and hardware to address known vulnerabilities and improve security.
What is IoT security?
IoT security focuses on securing internet-connected devices, such as smart appliances and sensors, which may have security vulnerabilities.
What is cloud security?
Cloud security involves securing data and applications stored in cloud services and ensuring their protection from cyber threats.
What is AI and machine learning in network security?
AI and machine learning are used in network security to detect and respond to threats by analyzing large volumes of data and identifying patterns.
What is zero-day vulnerability?
A zero-day vulnerability is a security flaw that is exploited by attackers before a patch or fix is available, posing a significant threat.
What is a security incident response plan?
A security incident response plan outlines the actions to be taken in the event of a security breach, helping to minimize damage and recover quickly.