Thursday, April 1, 2021

Network Security

 IT6310 - Network Security


Network security is the practice of preventing and protecting against unauthorized intrusion into corporate networks.

True

Stephen Northcutt wrote an essay on the basics of network security for CS) online last year.

False

Network security is the process of taking physical and software preventative measures to protect the underlying networking infrastructure from unauthorized access

True

Preventive security is implemented by the tasks and tools you use to prevent unauthorized people or programs from accessing your networks and the devices connected to them.

False

As a philosophy, it complements midpoint security, which focuses on individual devices; preventive security instead focuses on how those devices interact, and on the connective tissue between them.

False

If there's one common theme among security experts, it's that relying on one single line of defense is dangerous, because any single defensive tool can be defeated by a determined adversary.

defense in depth strategy

This is an enhanced encryption protocol combining a 104-bit key and a 24-bit initializing vector.

WEP 128

It uses available resources, such as passwords or scripts.

unstructured attacks

It helps prevent attackers from monitoring or recording traffic between resources and computers.

data encryption

These are created with malicious intent and sent by attackers.

virus

A tool (typically based on IPsec or SSL) that authenticates the communication between a device and a secure network, creating a secure, encrypted "tunnel" across the open internet

VPN

This refers to the events or attacks that steal, damage, or destroy equipment.

physical security threats

This is data being transported on a network.

traffic

One example is when an employee intends to cause damage.

malicious threats

Software designed to detect, disable, and remove viruses, worms, and Trojans.

antivirus

This is a way of protecting a computer from intrusion through the ports.

firewall

It is a self-replicating program that is harmful to networks.

worm

It disguises as useful software.

trojan horse

A security layer used in mobile devices that employ the Wireless Applications Protocol (WAP).

WTLS

It is a wireless security protocol created by Cisco to address the weaknesses in WEP and WPA.

LEAP

It could be exploited because of an encryption key that was vulnerable to decoding.

WEP 64

These are the events or attacks that remove, corrupt, deny access to, allow access to, or steal information.

data security attacks

It was the first generation security standard for wireless network.

WEP

Human beings are inevitably the weakest security link. You need to implement technologies and processes to ensure that staffers don't deliberately or inadvertently send sensitive data outside the network.

Data Loss Prevention

If the network isn't a line or a point: it's a _____________.

territory

This is when the user damages data or equipment unintentionally.

accidental threats

It helps keep data and equipment safe by giving only the appropriate people access.

network security

It uses code to access operating systems and software.

structured attacks

This is an improved version of WEP.

WPA

This is a networking infrastructure company.

CISCO

1 comment: