Skip to content

Latest commit

 

History

History
79 lines (70 loc) · 4.92 KB

File metadata and controls

79 lines (70 loc) · 4.92 KB

Category 04: Network Security (60 Facts)

Security Fundamentals

  1. CIA Triad = Confidentiality, Integrity, Availability — core security goals (Domain 4.1).
  2. Defense in Depth uses multiple layers of security controls (Domain 4.1).
  3. Least privilege ensures users get only the access they need (Domain 4.1).
  4. Zero Trust assumes no implicit trust for devices or users (Domain 4.1).
  5. AAA framework = Authentication, Authorization, Accounting (Domain 4.1).
  6. Authentication verifies identity (password, biometric, token) (Domain 4.1).
  7. Authorization grants access to resources based on policies (Domain 4.1).
  8. Accounting logs user activities for auditing (Domain 4.1).

Threats & Attacks

  1. DoS (Denial of Service) floods a resource to make it unavailable (Domain 4.2).
  2. DDoS uses many compromised devices to overwhelm targets (Domain 4.2).
  3. Man-in-the-middle (MITM) intercepts and alters communication (Domain 4.2).
  4. Phishing tricks users into revealing credentials via fake emails (Domain 4.2).
  5. Spear phishing targets specific individuals with tailored messages (Domain 4.2).
  6. Whaling targets high-profile executives (Domain 4.2).
  7. Ransomware encrypts data until payment is made (Domain 4.2).
  8. Logic bombs execute malicious actions when triggered (Domain 4.2).
  9. Password attacks include brute force, dictionary, and rainbow tables (Domain 4.2).
  10. Social engineering manipulates people into giving up info (Domain 4.2).

Network Hardening

  1. Firewalls filter traffic based on rules (Domain 4.3).
  2. Host-based firewalls protect individual devices (Domain 4.3).
  3. Next-Generation Firewalls (NGFW) add deep packet inspection (Domain 4.3).
  4. IDS (Intrusion Detection System) alerts on suspicious activity (Domain 4.3).
  5. IPS (Intrusion Prevention System) blocks malicious traffic (Domain 4.3).
  6. SIEM (Security Information and Event Management) aggregates logs and alerts (Domain 4.3).
  7. Proxy servers obscure client identity and filter content (Domain 4.3).
  8. Content filters block malicious or unwanted websites (Domain 4.3).
  9. DLP (Data Loss Prevention) stops unauthorized data exfiltration (Domain 4.3).
  10. NAC (Network Access Control) enforces endpoint compliance before access (Domain 4.3).

Authentication & Access Control

  1. RADIUS provides centralized AAA for network access (UDP 1812/1813) (Domain 4.4).
  2. TACACS+ is Cisco’s AAA protocol using TCP 49 (Domain 4.4).
  3. Kerberos uses tickets for authentication in Windows domains (Domain 4.4).
  4. LDAP/LDAPS provides directory-based authentication (Domain 4.4).
  5. MFA (Multi-Factor Authentication) combines two or more factors (Domain 4.4).
  6. Something you know = password, PIN (Domain 4.4).
  7. Something you have = smart card, token, phone (Domain 4.4).
  8. Something you are = biometric (fingerprint, retina) (Domain 4.4).
  9. Geolocation can be used as an authentication factor (Domain 4.4).
  10. SSO (Single Sign-On) allows one login for multiple apps (Domain 4.4).

Secure Protocols

  1. HTTPS (443) secures web traffic with TLS (Domain 4.5).
  2. SSH (22) provides encrypted remote access (Domain 4.5).
  3. SFTP uses SSH for secure file transfer (Domain 4.5).
  4. FTPS adds TLS encryption to FTP (Domain 4.5).
  5. SNMPv3 encrypts management traffic, unlike v1/v2c (Domain 4.5).
  6. IPsec encrypts IP traffic with AH/ESP headers (Domain 4.5).
  7. IKE (Internet Key Exchange) establishes IPsec VPN sessions (Domain 4.5).
  8. TLS is the standard encryption protocol for data-in-transit (Domain 4.5).
  9. DNSSEC adds authentication to DNS lookups (Domain 4.5).
  10. SMTP with STARTTLS secures email transport (Domain 4.5).

Wireless Security

  1. WEP is insecure and deprecated (Domain 4.6).
  2. WPA uses TKIP encryption, less secure than WPA2 (Domain 4.6).
  3. WPA2 uses AES-based CCMP encryption (Domain 4.6).
  4. WPA3 adds forward secrecy and stronger handshakes (Domain 4.6).
  5. Open networks provide no encryption, only convenience (Domain 4.6).
  6. Enterprise Wi-Fi uses 802.1X authentication with RADIUS (Domain 4.6).
  7. Pre-shared key (PSK) is used for home/small office Wi-Fi (Domain 4.6).
  8. Captive portals require login before internet access (Domain 4.6).
  9. Rogue APs are unauthorized access points (Domain 4.6).
  10. Evil twin attacks mimic real APs to steal credentials (Domain 4.6).

Physical & Administrative Controls

  1. Security guards, locks, and cameras enforce physical security (Domain 4.7).
  2. Security awareness training reduces risk of human error (Domain 4.7).

📊 Category Total: 60 Facts (threats, controls, protocols, wireless, and physical security fully covered)