Save
CS 🖥️🤓
Unit 4 Networks
Network Security
Save
Share
Learn
Content
Leaderboard
Share
Learn
Created by
Gaia Storaci
Visit profile
Cards (18)
What is the aim of
network security
?
Protect a network and the data from
internal
and
external
threats
Security threats
(
3 Ds
)
A malicious or unintended incidinet that causes
disruption
,
damage
or data loss
Internal threats
come from
employees
, for example, clicking on a link in an email.
External threats
com from
hackers
, for exampl, exploiting a
vulnerability
Confidentiality
An
organisation
is likely to hold sensitive data
Only
authorised
people should be able to access confidential data
Correctness
For data to be useful, it nust be correct.
Data integrity can be comprimised intentionally or unintentionally
Availability
A
network
is useless if it can't be accessed when needed
Ethical hacking
Involves legally breaking into computers and devices to test an organisation's defences.
It is performed by
security experts
known as ethical hackers to identify and fix security
vulnerablilities
Penetration Testing
Stimulating
cyber-attacks
to find security weakness
Vulnerability Assessment
Identifying and evalutaing
security
flaws in systems
Red Teaming
A group of ethical hackers stimulatring real-world attacks to test defences
Physical security
Refers to the measures taken toi prevent physical access to somputing equipment
What is
physical security
used for?
To control access to
critical
areas or protect against theft
Access Control
Determines who can log into a network and what they can see and do on the network
Why is a
multi-factor authentication
used?
For an
extra
level of security
Examples of
multi-facor
authentication
A piece of
knowledge
A physical
artefact
A physical
contribute
What do the principles of least priviledge give to employees?
The
permissions
and
administartive
rights they need to do their jobs.
File permissions:
Read-Only
Read and write access
Execute
Delete
Why is
encryption
used?
To keep data
secure
Firewall
A network security system that accts as a barrier between the internet network and the Internet
It inspects incoming and outgoing data traffic and uses a set of rules to determine which data is allowed to pass.