The true security + chapter 4 flashcards

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/101

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

102 Terms

1
New cards

Protocol Analyzer

A tool that captures and inspects network traffic to troubleshoot issues and detect malicious activity.

2
New cards

Intrusion Detection System (IDS)

Monitors network or host activity and alerts administrators when suspicious or malicious behavior is detected.

3
New cards

Intrusion Prevention System (IPS)

Monitors traffic and actively blocks or rejects malicious traffic in real time.

4
New cards

Active IDS

An IDS that can automatically respond to threats, such as resetting connections or sending alerts.

5
New cards

HIDS (Host-based IDS)

Monitors activity on a single host, including logs, files, and system calls.

6
New cards

NIDS (Network-based IDS)

Monitors traffic flowing across a network segment.

7
New cards

Signature-Based IDS

Detects attacks by comparing activity to known attack signatures.

8
New cards

Signature-Based IPS

Blocks traffic that matches known attack signatures.

9
New cards

Heuristic-Based HIDS

Detects threats using rules, behavior analysis, and experience rather than signatures.

10
New cards

Anomaly-Based HIDS

Detects attacks by identifying deviations from a normal baseline.

11
New cards

False Positive

Normal activity incorrectly identified as malicious.

12
New cards

False Negative

Malicious activity that is not detected.

13
New cards

IDS vs IPS Application

IDS detects and alerts; IPS detects and blocks traffic inline.

14
New cards

Baseline

A known normal state used to detect abnormal behavior.

15
New cards

SCADA

Systems that control industrial processes; often targeted due to legacy security.

16
New cards

Honeypot

A decoy system designed to attract and study attackers.

17
New cards

Honeynet

A network of honeypots used to analyze attack methods.

18
New cards

Honeyfile

A fake file used to detect unauthorized access.

19
New cards

Honeytoken

A fake credential or data element used to detect misuse.

20
New cards

Wireless Access Point (WAP / AP)

Connects wireless devices to a wired network.

21
New cards

SSID (Service Set Identifier)

The broadcast name that identifies a wireless network.

22
New cards

SSID Broadcast

The act of advertising the SSID so devices can discover the network.

23
New cards

MAC Filtering

Allows or blocks devices based on MAC addresses.

24
New cards

MAC Spoofing

Changing a device’s MAC address to impersonate an authorized device.

25
New cards

Wireless Footprinting

Identifying wireless networks, security settings, and signal ranges.

26
New cards

Channel Overlap Map

A diagram showing overlapping wireless channels that cause interference.

27
New cards

Heatmap

A visual representation of wireless signal strength coverage.

28
New cards

Hotspot

An area where wireless network access is available.

29
New cards

Dead Spot

An area with weak or no wireless signal.

30
New cards

Wi-Fi Analyzer

A tool that identifies signal strength, channels, and interference.

31
New cards

Wireless Frequency Channels

Specific radio frequencies used by Wi-Fi to transmit data.

32
New cards

WPA2 (Wi-Fi Protected Access 2)

A wireless security protocol using AES with CCMP for encryption.

33
New cards

WPA3

A wireless security protocol that improves protection against password and replay attacks.

34
New cards

AES (Advanced Encryption Standard)

A strong symmetric encryption algorithm used to protect data.

35
New cards

CCMP

An encryption protocol that provides confidentiality and integrity using AES.

36
New cards

Open Mode

A wireless mode with no authentication and minimal security.

37
New cards

Pre-Shared Key (PSK) / Personal Mode

A shared secret used for authentication.

38
New cards

Enterprise Mode

A mode using individual authentication via 802.1X and RADIUS.

39
New cards

802.1X Authentication

Port-based access control requiring authentication before access.

40
New cards

Authentication Server

A server that validates user or device credentials.

41
New cards

RADIUS Server

A centralized authentication server used with 802.1X and EAP.

42
New cards

RADIUS

Centralized authentication, authorization, and accounting service.

43
New cards

RADIUS Federation

A trust relationship allowing authentication across organizations.

44
New cards

RADIUS Port

UDP 1812 for authentication and UDP 1813 for accounting.

45
New cards

Simultaneous Authentication of Equals (SAE)

A secure WPA3 handshake that prevents offline password attacks.

46
New cards

EAP (Extensible Authentication Protocol)

A framework supporting multiple authentication methods.

47
New cards

PEAP

Uses a TLS tunnel to protect credentials during authentication.

48
New cards

EAP-TTLS

Uses a secure tunnel to protect inner authentication methods.

49
New cards

EAP-TLS

Uses mutual certificate-based authentication.

50
New cards

EAP-FAST

Cisco EAP method using protected tunnels without certificates.

51
New cards

Most Secure EAP

EAP-TLS because it uses mutual certificate authentication.

52
New cards

Captive Portal

A web-based login page required before network access is granted.

53
New cards

Disassociation Attack

Forces clients to disconnect and reauthenticate.

54
New cards

Wi-Fi Protected Setup (WPS)

A convenience feature that weakens wireless security.

55
New cards

Rogue Access Point

An unauthorized access point on a network.

56
New cards

Evil Twin

A malicious system impersonating a legitimate access point.

57
New cards

Jamming Attack

Disrupts wireless communication using interference.

58
New cards

Initialization Vector (IV)

A random value used to prevent encryption repetition.

59
New cards

IV Attack

Exploits weak or reused IVs to break encryption.

60
New cards

Wireless Replay Attack

Capturing and retransmitting valid traffic to impersonate a user.

61
New cards

Near Field Communication (NFC)

Short-range wireless communication technology.

62
New cards

NFC Reader

A device that reads NFC data.

63
New cards

NFC Jamming Attack

Disrupting NFC communication using interference.

64
New cards

Radio Frequency Identification (RFID)

Uses radio waves to identify tagged objects.

65
New cards

Active RFID Tags

RFID tags with their own power source.

66
New cards

Passive RFID Tags

RFID tags powered by the reader.

67
New cards

RFID Eavesdropping

Intercepting RFID communications.

68
New cards

RFID Cloning

Copying RFID data to impersonate a legitimate tag.

69
New cards

RFID Denial of Service

Preventing RFID systems from functioning.

70
New cards

Bluetooth

Short-range wireless communication protocol.

71
New cards

Bluejacking

Sending unsolicited messages over Bluetooth.

72
New cards

Bluesnarfing

Stealing data from a device over Bluetooth.

73
New cards

Bluebugging

Gaining remote control of a Bluetooth device.

74
New cards

VPN (Virtual Private Network)

Encrypts traffic to securely connect over untrusted networks.

75
New cards

Remote Access VPN

Allows individual users to securely connect to a private network.

76
New cards

Site-to-Site VPN

Securely connects two networks over the internet.

77
New cards

IPsec Authentication Header (AH)

Provides integrity and authentication but not encryption.

78
New cards

Encapsulating Security Payload (ESP)

Provides confidentiality, integrity, and authentication.

79
New cards

IPsec Tunnel Mode

Encrypts the entire IP packet.

80
New cards

IPsec Transport Mode

Encrypts only the payload.

81
New cards

Full Tunnel VPN

Encrypts all traffic through the VPN.

82
New cards

Split Tunnel VPN

Encrypts only private network traffic.

83
New cards

On-Demand VPN

Automatically connects when needed.

84
New cards

Always-On VPN

Maintains a constant VPN connection.

85
New cards

TLS

Secures data in transit using encryption.

86
New cards

L2TP

A tunneling protocol often combined with IPsec.

87
New cards

HTML5 VPN

A browser-based VPN solution without client software.

88
New cards

Network Access Control (NAC)

Evaluates device health before allowing access.

89
New cards

Remediation Network

A restricted network for noncompliant devices.

90
New cards

Persistent NAC Agent

A permanently installed NAC agent.

91
New cards

Dissolvable NAC Agent

A temporary NAC agent removed after the session.

92
New cards

Agentless NAC System

Evaluates devices without installing software.

93
New cards

Remote Access Authentication

Authentication for users connecting remotely.

94
New cards

Password Authentication Protocol (PAP)

Sends passwords in cleartext.

95
New cards

Cleartext

Unencrypted, readable data.

96
New cards

Challenge Handshake Authentication Protocol (CHAP)

Uses challenge-response authentication.

97
New cards

Cisco TACACS+

Encrypts the entire authentication process and uses TCP.

98
New cards

TCP (Transmission Control Protocol)

Reliable, connection-oriented transport protocol.

99
New cards

Architectural Diagram

A visual layout showing network components and connections.

100
New cards

BPDU Guard

A switch feature that disables ports receiving unauthorized BPDUs.