Network Security

Cards (18)

  • What is the aim of network security?

    Protect a network and the data from internal and external threats
  • Security threats (3 Ds)

    A malicious or unintended incidinet that causes disruption , damage or data loss
  • Internal threats come from employees, for example, clicking on a link in an email.
    External threats com from hackers, for exampl, exploiting a vulnerability
  • Confidentiality
    An organisation is likely to hold sensitive data
    Only authorised people should be able to access confidential data
  • Correctness
    For data to be useful, it nust be correct.
    Data integrity can be comprimised intentionally or unintentionally
  • Availability
    A network is useless if it can't be accessed when needed
  • Ethical hacking
    Involves legally breaking into computers and devices to test an organisation's defences.
    It is performed by security experts known as ethical hackers to identify and fix security vulnerablilities
  • Penetration Testing
    Stimulating cyber-attacks to find security weakness
  • Vulnerability Assessment
    Identifying and evalutaing security flaws in systems
  • Red Teaming
    A group of ethical hackers stimulatring real-world attacks to test defences
  • Physical security
    Refers to the measures taken toi prevent physical access to somputing equipment
  • What is physical security used for?

    To control access to critical areas or protect against theft
  • Access Control
    Determines who can log into a network and what they can see and do on the network
  • Why is a multi-factor authentication used?

    For an extra level of security
  • Examples of multi-facor authentication
    A piece of knowledge
    A physical artefact
    A physical contribute
  • What do the principles of least priviledge give to employees?
    The permissions and administartive rights they need to do their jobs.
    File permissions:
    Read-Only
    Read and write access
    Execute
    Delete
  • Why is encryption used?

    To keep data secure
  • Firewall
    A network security system that accts as a barrier between the internet network and the Internet
    It inspects incoming and outgoing data traffic and uses a set of rules to determine which data is allowed to pass.