Boundary Protection & Network Security Vocabulary

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/75

flashcard set

Earn XP

Description and Tags

A comprehensive set of vocabulary flashcards covering key terms and concepts from the lecture on boundary protection, perimeter security, defense-in-depth, network devices, authentication, cryptography, vulnerabilities, incident response, and mitigation strategies.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

76 Terms

1
New cards

Boundary Protection

Monitoring and controlling communication at a system’s external edge to prevent and detect unauthorized access.

2
New cards

Perimeter Network

A strategically enforced boundary within a network where security policy is applied to control traffic and usage.

3
New cards

Outermost (Untrusted) Perimeter

The network segment separating controlled assets from uncontrolled assets; the most insecure zone.

4
New cards

Internal (DMZ)

Perimeter segment between trusted and untrusted networks that enforces internal security policy for external exchanges.

5
New cards

Innermost (Trusted) Perimeter

The final protective network zone containing mission-critical devices and employing the most security layers.

6
New cards

Principle of Least Privilege (PoLP)

Granting users only the minimum access rights needed to perform their jobs.

7
New cards

Defense-in-Depth (DiD)

DoD approach using multiple, layered security controls across people, technology, and operations.

8
New cards

Trusted Communication Path

Secure, firewall-controlled link established between remote users and internal resources.

9
New cards

Series Security Configuration

Placing security controls one after another so every attack is examined by each control.

10
New cards

Parallel Security Configuration

Placing security controls side-by-side; wider but shallower protection than series configuration.

11
New cards

Proxy Server

Device/application that breaks client-server connections, forwarding approved traffic and hiding internal addresses.

12
New cards

Gateway

Intermediate system that enables communication between dissimilar networks by converting protocols, speeds, or codes.

13
New cards

Guard System

Trusted mechanism that filters data exchanged between systems operating at different security levels.

14
New cards

Firewall

Perimeter security device that permits or blocks network traffic based on prescribed rules.

15
New cards

Encrypted Tunneling

Encapsulating one network protocol inside another to send protected data across an untrusted network.

16
New cards

Virtual Private Network (VPN)

Secure connection over a public network that gives the impression of a dedicated private link.

17
New cards

VPN Gateway

Network device that bridges and secures traffic between multiple networks within a VPN infrastructure.

18
New cards

VPN Concentrator

High-capacity appliance that creates, manages, and encrypts numerous VPN tunnels for remote or site-to-site access.

19
New cards

Voice Protection System (VPS)

Firewall-like system for phone lines that blocks war-dialers, unauthorized modems, and other voice threats.

20
New cards

Secure Real-Time Transport Protocol (SRTP)

Profile of RTP providing confidentiality, authentication, and replay protection for real-time audio/video.

21
New cards

Internet Protocol Security (IPSec)

Layer-3 suite that provides encryption and integrity via ESP, AH, IKE, and related protocols.

22
New cards

Encapsulating Security Payload (ESP)

IPSec component that offers encryption and optional authentication of packet payloads.

23
New cards

Authentication Header (AH)

IPSec component that authenticates IP packets without encrypting the payload.

24
New cards

Internet Key Exchange (IKE)

Protocol suite used by IPSec to negotiate security associations and exchange keys.

25
New cards

Host-based IDS (HIDS)

Intrusion detection that monitors activities within a single host’s OS, files, and processes.

26
New cards

Network-based IDS (NIDS)

Intrusion detection that captures and analyzes packets traversing a network segment.

27
New cards

Intrusion Detection System (IDS)

Tool that scans, audits, and alerts on signs of unauthorized or malicious activity.

28
New cards

Intrusion Prevention System (IPS)

Active control that blocks or mitigates detected attacks in real time.

29
New cards

Signature-based Detection

Identifying threats by matching activity to known attack patterns.

30
New cards

Anomaly-based Detection

Identifying threats by flagging behavior that deviates from an established baseline.

31
New cards

Policy-based Detection

Identifying violations of administrator-defined security policies.

32
New cards

Misuse Detection

Comparing observed actions to a database of known attack signatures to spot insider or external abuse.

33
New cards

Authentication Factor: Something You Know

Knowledge-based credential such as a password, PIN, or passphrase.

34
New cards

Authentication Factor: Something You Have

Possession-based credential such as a CAC, hardware token, or key fob.

35
New cards

Authentication Factor: Something You Are

Inherent biometric trait like fingerprint, iris pattern, or facial geometry.

36
New cards

Authentication Factor: Something You Do

Behavioral characteristic such as keystroke dynamics or gait pattern.

37
New cards

Authentication Factor: Somewhere You Are

Location-based attribute verified by GPS data, IP address, or physical presence.

38
New cards

Two-Factor Authentication (2FA)

Verification method requiring credentials from two different authentication factors.

39
New cards

Multi-Factor Authentication (MFA)

Verification method requiring credentials from three or more different authentication factors.

40
New cards

Symmetric Cryptography

Encryption that uses the same secret key for both encryption and decryption.

41
New cards

Asymmetric Cryptography

Encryption that uses a public key to encrypt or sign data and a private key to decrypt or verify.

42
New cards

Public Key

Widely shared key used to encrypt data for, or verify signatures from, a specific entity.

43
New cards

Private Key

Secret key held only by its owner, used to decrypt data or create digital signatures.

44
New cards

Access Control List (ACL)

Table defining which users or systems can access specific resources and in what way.

45
New cards

Identity-Based Access Control (IBAC)

Restricting access based directly on authenticated user identities.

46
New cards

Mandatory Access Control (MAC)

Access model in which a central authority enforces security labels and clearances.

47
New cards

Discretionary Access Control (DAC)

Access model where resource owners determine permissions for subjects.

48
New cards

Role-Based Access Control (RBAC)

Access model granting permissions based on organizational roles.

49
New cards

Attribute-Based Access Control (ABAC)

Access model using policies that evaluate attributes of subjects, objects, and environment.

50
New cards

Malware

Any software inserted with intent to compromise confidentiality, integrity, or availability.

51
New cards

Virus

Self-replicating code that attaches to files or programs and spreads to other hosts.

52
New cards

Worm

Standalone self-replicating program that spreads across networks, often consuming resources.

53
New cards

Trojan Horse

Program with a useful appearance that secretly performs malicious actions.

54
New cards

Spyware

Software covertly installed to collect user or organization information without consent.

55
New cards

Logic Bomb

Malicious code that triggers a harmful function when specific conditions are met.

56
New cards

Spam

Unsolicited bulk electronic messages, often used to distribute malware or phishing links.

57
New cards

Denial of Service (DoS)

Attack that overwhelms a target with traffic or requests, disrupting normal service.

58
New cards

Distributed Denial of Service (DDoS)

DoS attack launched from multiple compromised systems (botnet) under centralized control.

59
New cards

Evil Twin Attack

Rogue wireless access point mimicking a legitimate SSID to steal credentials.

60
New cards

Jamming

Emission of interference on wireless frequencies to render WLAN communication unusable.

61
New cards

Bluejacking

Sending unsolicited messages over a Bluetooth connection.

62
New cards

Bluesnarfing

Hijacking a Bluetooth connection to steal data during or after device pairing.

63
New cards

Computer Security Incident Response Team (CSIRT)

Designated group that investigates and responds to computer security incidents.

64
New cards

Incident Response Plan (IRP)

Documented strategy outlining how an organization prepares for and handles security incidents.

65
New cards

IRP Phase: Preparation

Pre-incident activities such as policy, training, and tool acquisition to enable effective response.

66
New cards

IRP Phase: Detection and Analysis

Identifying and confirming that an event is a security incident requiring action.

67
New cards

IRP Phase: Containment, Eradication, and Recovery

Limiting damage, removing threats, and restoring systems to normal operation.

68
New cards

IRP Phase: Post-Event Activity

Lessons learned, documentation, and improvements after incident resolution.

69
New cards

Security Technical Implementation Guide (STIG)

DISA configuration standard used to secure DoD information systems and software.

70
New cards

CAT I Severity

Most critical STIG finding that allows immediate system compromise; demands urgent fix.

71
New cards

CAT II Severity

STIG finding with high potential for unauthorized access; important but less urgent than CAT I.

72
New cards

CAT III Severity

STIG finding that degrades security measures but poses lower immediate risk than CAT I/II.

73
New cards

Integrated Network Operations & Security Center (I-NOSC)

AF organization that monitors, coordinates, and directs network security actions across bases.

74
New cards

Unified Master Gold Disk (UMGD)

DISA-approved software set used to verify system compliance and detect vulnerabilities.

75
New cards

Fault Tolerance

System property allowing continued operation despite component failures.

76
New cards

RAID (Redundant Array of Independent Disks)

Storage technology that combines multiple disks for redundancy and/or performance.