Logo
Pattern

Discover published sets by community

Explore tens of thousands of sets crafted by our community.

Network Security Concepts

25

Flashcards

0/25

Still learning
StarStarStarStar

Encryption

StarStarStarStar

Encryption is the process of converting data or information into a code, especially to prevent unauthorized access. Its purpose is to protect the confidentiality of digital data stored on computer systems or transmitted via the internet or other computer networks.

StarStarStarStar

SIEM

StarStarStarStar

Security Information and Event Management (SIEM) is a set of tools and services offering a holistic view of an organization's information security. The purpose is to provide real-time analysis of security alerts generated by network hardware and applications and to aggregate and analyze log data.

StarStarStarStar

Zero Trust Model

StarStarStarStar

The Zero Trust model is a security concept centered on the belief that organizations should not automatically trust anything inside or outside its perimeters and instead must verify anything and everything trying to connect to its systems before granting access. The purpose is to protect against internal and external threats.

StarStarStarStar

Cryptography

StarStarStarStar

Cryptography is the practice and study of techniques for secure communication in the presence of adversaries. The purpose is to ensure the confidentiality, integrity, authenticity, and non-repudiability of information.

StarStarStarStar

Incident Response

StarStarStarStar

Incident response is the methodology an organization uses to respond to and manage a cyberattack. An incident response plan includes the steps to minimize damage, reduce recovery time and costs, and mitigate the exploited vulnerabilities.

StarStarStarStar

Distributed Denial of Service (DDoS)

StarStarStarStar

A DDoS attack is an attempt to make an online service unavailable by overwhelming it with traffic from multiple sources. The purpose is to disrupt normal traffic of a targeted server, service, or network.

StarStarStarStar

Firewall

StarStarStarStar

A firewall is a network security device that monitors and controls incoming and outgoing network traffic based on predetermined security rules. Its purpose is to establish a barrier between your internal network and incoming traffic from external sources (such as the internet) to block malicious traffic like viruses and hackers.

StarStarStarStar

VPN

StarStarStarStar

A Virtual Private Network (VPN) extends a private network across a public network, allowing users to send and receive data as if their computing devices were directly connected to the private network. The purpose of a VPN is to provide secure and encrypted connections for remote access and protect sensitive data during transmission.

StarStarStarStar

Data Loss Prevention

StarStarStarStar

Data Loss Prevention (DLP) software detects potential data breaches/data ex-filtration transmissions and prevents them by monitoring, detecting, and blocking sensitive data while in use (endpoint actions), in motion (network traffic), and at rest (data storage).

StarStarStarStar

Risk Assessment

StarStarStarStar

Risk assessment involves the determination of the quantitative or qualitative value of risk related to a concrete situation and a recognized threat. The purpose is to inform decision-making by detailing potential risks and impacts.

StarStarStarStar

Application Layer Security

StarStarStarStar

Application layer security refers to methods of protecting web applications at the layer where they execute. This includes implementing security measures within the application itself, such as input validation, to protect against attacks like SQL injection and cross-site scripting (XSS).

StarStarStarStar

PKI

StarStarStarStar

Public Key Infrastructure (PKI) is a framework of policies, processes, and technologies that enable secure electronic communication through the use of a pair of encryption keys, one private and one public. The purpose is to facilitate secure data transfer, digital signatures, and authentication of identity over networks.

StarStarStarStar

Phishing

StarStarStarStar

Phishing is a type of social engineering where attackers send fraudulent messages designed to trick a person into revealing sensitive information to the attacker or to deploy malicious software on the victim's infrastructure like ransomware.

StarStarStarStar

Two-Factor Authentication

StarStarStarStar

Two-factor authentication (2FA) is an additional security layer used to ensure that people trying to gain access to an online account are who they say they are. The purpose is to enhance the security of online interactions by requiring two different forms of identification.

StarStarStarStar

Man-in-the-Middle Attack

StarStarStarStar

A man-in-the-middle attack is a type of cyberattack where a malicious actor inserts themselves into a conversation between two parties, intercepts, and potentially alters the communication without the parties knowing.

StarStarStarStar

Social Engineering

StarStarStarStar

Social engineering is the art of manipulating people so they give up confidential information. The purpose is usually to gain unauthorized access to systems, networks, or physical locations, or for financial gain.

StarStarStarStar

IDS/IPS

StarStarStarStar

Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS) are security technologies designed to detect and prevent malicious activity in a network. IDS monitors the network for suspicious activity and generates alerts, while IPS also takes active steps to block that activity. Their purpose is to identify potential threats and stop them from exploiting vulnerabilities.

StarStarStarStar

Antivirus Software

StarStarStarStar

Antivirus software is designed to detect, prevent, and remove malware, including viruses, worms, and trojans. Its purpose is to protect the computer from malicious software that can cause damage to data and systems or steal personal information.

StarStarStarStar

Access Control

StarStarStarStar

Access control is a security technique that can be used to regulate who or what can view or use resources in a computing environment. The purpose is to minimize the risk of unauthorized access to physical and logical systems.

StarStarStarStar

Penetration Testing

StarStarStarStar

Penetration testing, or pen testing, is the practice of testing a computer system, network, or web application to find vulnerabilities that an attacker could exploit. The purpose is to identify and fix security vulnerabilities before they can be exploited.

StarStarStarStar

Network Segmentation

StarStarStarStar

Network segmentation is the process of splitting a computer network into subnetworks, each being a network segment. The purpose is to improve performance and security by reducing congestion and containing network problems.

StarStarStarStar

DMZ

StarStarStarStar

A demilitarized zone (DMZ) is a physical or logical subnetwork that contains and exposes an organization's external-facing services to an untrusted network, usually the internet. The purpose is to add an additional layer of security to an organization's local area network (LAN); an external attacker only has access to equipment in the DMZ, rather than any other part of the network.

StarStarStarStar

SSL/TLS

StarStarStarStar

Secure Sockets Layer (SSL) and Transport Layer Security (TLS) are cryptographic protocols designed to provide secure communication over a computer network. The purpose is to ensure privacy and data integrity between two communicating computer applications (e.g., a web server and a browser).

StarStarStarStar

Honeypot

StarStarStarStar

A honeypot is a security mechanism set to detect, deflect, or in some manner counteract attempts at unauthorized use of information systems. Generally, it consists of a computer, data, or a network site that appears to be part of a network but is actually isolated and monitored.

StarStarStarStar

Patch Management

StarStarStarStar

Patch management is the process of distributing and applying updates to software. These patches are often necessary to correct errors (known as "bugs") or to address security vulnerabilities and exploits.

Know
0
Still learning
Click to flip
Know
0
Logo

© Hypatia.Tech. 2024 All rights reserved.