Explore tens of thousands of sets crafted by our community.
Network Security Concepts
25
Flashcards
0/25
Encryption
Encryption is the process of converting data or information into a code, especially to prevent unauthorized access. Its purpose is to protect the confidentiality of digital data stored on computer systems or transmitted via the internet or other computer networks.
SIEM
Security Information and Event Management (SIEM) is a set of tools and services offering a holistic view of an organization's information security. The purpose is to provide real-time analysis of security alerts generated by network hardware and applications and to aggregate and analyze log data.
Zero Trust Model
The Zero Trust model is a security concept centered on the belief that organizations should not automatically trust anything inside or outside its perimeters and instead must verify anything and everything trying to connect to its systems before granting access. The purpose is to protect against internal and external threats.
Cryptography
Cryptography is the practice and study of techniques for secure communication in the presence of adversaries. The purpose is to ensure the confidentiality, integrity, authenticity, and non-repudiability of information.
Incident Response
Incident response is the methodology an organization uses to respond to and manage a cyberattack. An incident response plan includes the steps to minimize damage, reduce recovery time and costs, and mitigate the exploited vulnerabilities.
Distributed Denial of Service (DDoS)
A DDoS attack is an attempt to make an online service unavailable by overwhelming it with traffic from multiple sources. The purpose is to disrupt normal traffic of a targeted server, service, or network.
Firewall
A firewall is a network security device that monitors and controls incoming and outgoing network traffic based on predetermined security rules. Its purpose is to establish a barrier between your internal network and incoming traffic from external sources (such as the internet) to block malicious traffic like viruses and hackers.
VPN
A Virtual Private Network (VPN) extends a private network across a public network, allowing users to send and receive data as if their computing devices were directly connected to the private network. The purpose of a VPN is to provide secure and encrypted connections for remote access and protect sensitive data during transmission.
Data Loss Prevention
Data Loss Prevention (DLP) software detects potential data breaches/data ex-filtration transmissions and prevents them by monitoring, detecting, and blocking sensitive data while in use (endpoint actions), in motion (network traffic), and at rest (data storage).
Risk Assessment
Risk assessment involves the determination of the quantitative or qualitative value of risk related to a concrete situation and a recognized threat. The purpose is to inform decision-making by detailing potential risks and impacts.
Application Layer Security
Application layer security refers to methods of protecting web applications at the layer where they execute. This includes implementing security measures within the application itself, such as input validation, to protect against attacks like SQL injection and cross-site scripting (XSS).
PKI
Public Key Infrastructure (PKI) is a framework of policies, processes, and technologies that enable secure electronic communication through the use of a pair of encryption keys, one private and one public. The purpose is to facilitate secure data transfer, digital signatures, and authentication of identity over networks.
Phishing
Phishing is a type of social engineering where attackers send fraudulent messages designed to trick a person into revealing sensitive information to the attacker or to deploy malicious software on the victim's infrastructure like ransomware.
Two-Factor Authentication
Two-factor authentication (2FA) is an additional security layer used to ensure that people trying to gain access to an online account are who they say they are. The purpose is to enhance the security of online interactions by requiring two different forms of identification.
Man-in-the-Middle Attack
A man-in-the-middle attack is a type of cyberattack where a malicious actor inserts themselves into a conversation between two parties, intercepts, and potentially alters the communication without the parties knowing.
Social Engineering
Social engineering is the art of manipulating people so they give up confidential information. The purpose is usually to gain unauthorized access to systems, networks, or physical locations, or for financial gain.
IDS/IPS
Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS) are security technologies designed to detect and prevent malicious activity in a network. IDS monitors the network for suspicious activity and generates alerts, while IPS also takes active steps to block that activity. Their purpose is to identify potential threats and stop them from exploiting vulnerabilities.
Antivirus Software
Antivirus software is designed to detect, prevent, and remove malware, including viruses, worms, and trojans. Its purpose is to protect the computer from malicious software that can cause damage to data and systems or steal personal information.
Access Control
Access control is a security technique that can be used to regulate who or what can view or use resources in a computing environment. The purpose is to minimize the risk of unauthorized access to physical and logical systems.
Penetration Testing
Penetration testing, or pen testing, is the practice of testing a computer system, network, or web application to find vulnerabilities that an attacker could exploit. The purpose is to identify and fix security vulnerabilities before they can be exploited.
Network Segmentation
Network segmentation is the process of splitting a computer network into subnetworks, each being a network segment. The purpose is to improve performance and security by reducing congestion and containing network problems.
DMZ
A demilitarized zone (DMZ) is a physical or logical subnetwork that contains and exposes an organization's external-facing services to an untrusted network, usually the internet. The purpose is to add an additional layer of security to an organization's local area network (LAN); an external attacker only has access to equipment in the DMZ, rather than any other part of the network.
SSL/TLS
Secure Sockets Layer (SSL) and Transport Layer Security (TLS) are cryptographic protocols designed to provide secure communication over a computer network. The purpose is to ensure privacy and data integrity between two communicating computer applications (e.g., a web server and a browser).
Honeypot
A honeypot is a security mechanism set to detect, deflect, or in some manner counteract attempts at unauthorized use of information systems. Generally, it consists of a computer, data, or a network site that appears to be part of a network but is actually isolated and monitored.
Patch Management
Patch management is the process of distributing and applying updates to software. These patches are often necessary to correct errors (known as "bugs") or to address security vulnerabilities and exploits.
© Hypatia.Tech. 2024 All rights reserved.