Podcast
Questions and Answers
IoT devices are not susceptible to cyber threats.
IoT devices are not susceptible to cyber threats.
False
Access is granted by default in a Zero Trust security model.
Access is granted by default in a Zero Trust security model.
False
The OSI model helps standardize communication across networks by dividing it into multiple layers.
The OSI model helps standardize communication across networks by dividing it into multiple layers.
True
Application security involves developing features to protect against threats like unauthorized modification.
Application security involves developing features to protect against threats like unauthorized modification.
Signup and view all the answers
SDN technology enables more hardware layers to be implemented through software.
SDN technology enables more hardware layers to be implemented through software.
Signup and view all the answers
Network security measures are only designed to protect data after it has been transmitted.
Network security measures are only designed to protect data after it has been transmitted.
Signup and view all the answers
Cloud security is primarily concerned with protecting physical servers located on-premises.
Cloud security is primarily concerned with protecting physical servers located on-premises.
Signup and view all the answers
Endpoint security is a strategy used to create micro-segments around data whenever it may be.
Endpoint security is a strategy used to create micro-segments around data whenever it may be.
Signup and view all the answers
Mobile security includes strategies to prevent attacks from mobile devices accessing corporate data.
Mobile security includes strategies to prevent attacks from mobile devices accessing corporate data.
Signup and view all the answers
Data Loss Prevention (DLP) is a component of endpoint security.
Data Loss Prevention (DLP) is a component of endpoint security.
Signup and view all the answers
Internet security measures are irrelevant when it comes to interconnected networks.
Internet security measures are irrelevant when it comes to interconnected networks.
Signup and view all the answers
The seven main pillars of cybersecurity include Mobile Security and IoT Security.
The seven main pillars of cybersecurity include Mobile Security and IoT Security.
Signup and view all the answers
Zero Trust is an outdated security model that does not apply to modern cybersecurity strategies.
Zero Trust is an outdated security model that does not apply to modern cybersecurity strategies.
Signup and view all the answers
Study Notes
Cyber Security Part 2
- Cyber Security is a general term for tools designed to protect data and identify hacker threats.
- Network Security protects data during transmission.
- Internet Security protects data being transmitted across interconnected networks.
- Types of Cyber Security: Network Security, Cloud Security, Endpoint Security, Mobile Security, IoT Security, Application Security, and Zero Trust.
- Network Security Solutions: Data Loss Prevention (DLP), Identity Access Management (IAM), Network Access Control (NAC), and Next-Generation Firewall (NGFW) application controls.
- Cloud Security is crucial as cloud computing adoption increases. A cloud security strategy protects the entire cloud deployment (applications, data, infrastructure).
- Endpoint Security is used to secure end-user devices (desktops and laptops) with data and network controls, threat prevention (e.g., anti-phishing, anti-ransomware), and forensics (e.g., EDR).
- Mobile Security protects mobile devices (tablets, smartphones) from threats like malicious apps, zero-day attacks, phishing, and IM attacks. Mobile Device Management (MDM) solutions ensure only compliant devices access corporate assets.
- IoT Security protects Internet of Things (IoT) devices. Threat actors can use vulnerable IoT devices as pathways into corporate networks.
- Application Security is the process of developing, adding, and testing security features within applications to prevent vulnerabilities and unauthorized access/modification.
- Zero Trust Security means no one is trusted by default. Verification is required from anyone trying to access network resources. Access is denied by default; administrators must explicitly grant permissions.
- OSI Model: A standardized, intuitive way to understand network communication. The model splits network requirements into layers.
-
OSI Model Layers (from top to bottom):
- Application: Where humans process data.
- Presentation: Ensures data usability.
- Session: Maintains connections.
- Transport: Forwards data to appropriate services.
- Network: Responsible for path packets travel on.
- Data Link: Responsible for physical device packet routing.
- Physical: Physical infrastructure for data transport.
- Top 3 layers are usually implemented in software (within OS).
- Bottom 3 layers implemented in hardware within network devices (e.g. switches, routers, firewalls)
- Layer 4 (Transport): Connects software and hardware layers. Software-Defined Networking (SDN) allows more hardware layers to be implemented via software.
Security Attacks
- Security attacks are classified as passive or active.
- Passive Attacks: Attempt to learn or use information, not affect system resources (e.g. eavesdropping, monitoring transmissions; releasing message contents, traffic analysis).
- Active Attacks: Alter system resources or affect their operation.
Caesar Cipher
- A simple encryption cipher. The Caesar cipher shifts each letter a determined number of places down the alphabet.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Related Documents
Description
This quiz covers various aspects of cyber security, focusing on key areas such as network security, cloud security, and endpoint security. Understand the tools and strategies used to protect data across different platforms. Test your knowledge on the latest trends and technologies in the cyber security field.