Cyber Security Part 2
13 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

IoT devices are not susceptible to cyber threats.

False

Access is granted by default in a Zero Trust security model.

False

The OSI model helps standardize communication across networks by dividing it into multiple layers.

True

Application security involves developing features to protect against threats like unauthorized modification.

<p>True</p> Signup and view all the answers

SDN technology enables more hardware layers to be implemented through software.

<p>True</p> Signup and view all the answers

Network security measures are only designed to protect data after it has been transmitted.

<p>False</p> Signup and view all the answers

Cloud security is primarily concerned with protecting physical servers located on-premises.

<p>False</p> Signup and view all the answers

Endpoint security is a strategy used to create micro-segments around data whenever it may be.

<p>True</p> Signup and view all the answers

Mobile security includes strategies to prevent attacks from mobile devices accessing corporate data.

<p>True</p> Signup and view all the answers

Data Loss Prevention (DLP) is a component of endpoint security.

<p>False</p> Signup and view all the answers

Internet security measures are irrelevant when it comes to interconnected networks.

<p>False</p> Signup and view all the answers

The seven main pillars of cybersecurity include Mobile Security and IoT Security.

<p>True</p> Signup and view all the answers

Zero Trust is an outdated security model that does not apply to modern cybersecurity strategies.

<p>False</p> Signup and view all the answers

Study Notes

Cyber Security Part 2

  • Cyber Security is a general term for tools designed to protect data and identify hacker threats.
  • Network Security protects data during transmission.
  • Internet Security protects data being transmitted across interconnected networks.
  • Types of Cyber Security: Network Security, Cloud Security, Endpoint Security, Mobile Security, IoT Security, Application Security, and Zero Trust.
  • Network Security Solutions: Data Loss Prevention (DLP), Identity Access Management (IAM), Network Access Control (NAC), and Next-Generation Firewall (NGFW) application controls.
  • Cloud Security is crucial as cloud computing adoption increases. A cloud security strategy protects the entire cloud deployment (applications, data, infrastructure).
  • Endpoint Security is used to secure end-user devices (desktops and laptops) with data and network controls, threat prevention (e.g., anti-phishing, anti-ransomware), and forensics (e.g., EDR).
  • Mobile Security protects mobile devices (tablets, smartphones) from threats like malicious apps, zero-day attacks, phishing, and IM attacks. Mobile Device Management (MDM) solutions ensure only compliant devices access corporate assets.
  • IoT Security protects Internet of Things (IoT) devices. Threat actors can use vulnerable IoT devices as pathways into corporate networks.
  • Application Security is the process of developing, adding, and testing security features within applications to prevent vulnerabilities and unauthorized access/modification.
  • Zero Trust Security means no one is trusted by default. Verification is required from anyone trying to access network resources. Access is denied by default; administrators must explicitly grant permissions.
  • OSI Model: A standardized, intuitive way to understand network communication. The model splits network requirements into layers.
  • OSI Model Layers (from top to bottom):
    • Application: Where humans process data.
    • Presentation: Ensures data usability.
    • Session: Maintains connections.
    • Transport: Forwards data to appropriate services.
    • Network: Responsible for path packets travel on.
    • Data Link: Responsible for physical device packet routing.
    • Physical: Physical infrastructure for data transport.
    • Top 3 layers are usually implemented in software (within OS).
    • Bottom 3 layers implemented in hardware within network devices (e.g. switches, routers, firewalls)
  • Layer 4 (Transport): Connects software and hardware layers. Software-Defined Networking (SDN) allows more hardware layers to be implemented via software.

Security Attacks

  • Security attacks are classified as passive or active.
  • Passive Attacks: Attempt to learn or use information, not affect system resources (e.g. eavesdropping, monitoring transmissions; releasing message contents, traffic analysis).
  • Active Attacks: Alter system resources or affect their operation.

Caesar Cipher

  • A simple encryption cipher. The Caesar cipher shifts each letter a determined number of places down the alphabet.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

Cyber Security Part 2 PDF

Description

This quiz covers various aspects of cyber security, focusing on key areas such as network security, cloud security, and endpoint security. Understand the tools and strategies used to protect data across different platforms. Test your knowledge on the latest trends and technologies in the cyber security field.

More Like This

Use Quizgecko on...
Browser
Browser