4. Network Security - Multi-Stage Attacks & Defense Strategies | Terminology Set

0.0(0)
studied byStudied by 0 people
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/11

flashcard set

Earn XP

Description and Tags

How sophisticated attacks progress through multiple phases (initial access, lateral movement, privilege escalation) and comprehensive defensive approaches including network segmentation, access control, and monitoring.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

12 Terms

1
New cards

Network Access Control (NAC)

A security approach that controls access to a network based on device authentication and policy compliance.

2
New cards

Zero Trust Security Model

A framework that assumes no user or device should be automatically trusted, requiring verification for everyone regardless of location.

3
New cards

WIDS (Wireless Intrusion Detection System)

Technology that monitors wireless traffic to detect unauthorized access points and suspicious activity.

4
New cards

WIPS (Wireless Intrusion Prevention System)

Advanced version of WIDS that can actively prevent wireless attacks by blocking rogue devices.

5
New cards

802.1X Authentication

A port-based network access control protocol that requires clients to authenticate before accessing network resources.

6
New cards

OWE (Opportunistic Wireless Encryption)

A WPA3 feature that provides encryption for open Wi-Fi networks without requiring a password.

7
New cards

Segmentation

Dividing a network into separate segments (like VLANs) to limit the spread of attacks and restrict access.

8
New cards

DHCP Snooping Binding Table

A database of trusted IP-to-MAC bindings used to validate ARP packets and prevent spoofing.

9
New cards

Sticky MAC Learning

A security feature that dynamically learns MAC addresses and binds them to specific ports.

10
New cards

MAC Filtering

A security method that allows or denies network access based on device MAC addresses.

11
New cards

VPN (Virtual Private Network)

A technology that creates an encrypted tunnel for secure communication over untrusted networks.

12
New cards

Network Segregation

The practice of isolating different parts of a network based on security requirements and trust levels.