Access Control 101
Access Control 102
Basics of Network Design
Defense Against Network Attacks
100

The three categories of access control

Authentication, Authorization, Accounting

100
Authorization can be thought of as _______ to do certain actions

Permission

100

A device that directs traffic between networks

Router

100

Non-traditional devices connected to the internet to provide enhanced features

IoT Devices

200

The process of verifying that someone is who they say they are

Authentication

200

Making sure that every action taken on a system or network generates a record

Accounting

200

Two most common types of networks

LAN - local area network that connects devices in the same physical area

WAN - wide area networks that connect devices across a wide geo-graphical area

200

One of the most fundamental controls for a network

Firewall

300

True or False: An ID Card or Driver's license is a form of authentication

False - identification is a related concept of authentication 

300

Events that point to malicious activity taking place on a network, device, or account

Indicators of Attack (IoAs)

300

_____ work within a network by directing traffic between devices connected to it

Switches

300

Designed to detect attacks happening on the network and provide alerts to security personnel

Intrusion Detection Systems (IDS)

400

Some physical or behavioral attribute of a person

Biometric

400

Catchall term for capturing events that happen on a system during its operation

Logging

400

When an adversary intercepts traffic as it moves through the network

Sniffing

400

IDS is typically considered a _____ system because they do not stop the malicious traffic

Passive

500

5 types of authentication methods

Something You Know

Something You Have

Something You Are

Something You Do

Somewhere You Are

500

The standard ranking method for security event severity

Syslogs

500

Adversary technique in which the IP address of a legitime device on the network is copied to imitate that device

IP Spoofing

500

The two different methods used by Intrusion Detection Systems (IDS) to detect attacks

Signatures and heuristics