ITEC 100- WEEK 10

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/23

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

24 Terms

1
New cards

The defense of the underlying networking infrastructure against theft, abuse, and illegal access is known as network security. It entails building a secure infrastructure so that users, apps, devices, and applications can all operate

safely.

NETWORK SECURITY

2
New cards

designed to prevent unauthorized personnel from gaining physical access to network components

PHYSICAL

3
New cards

protect data that is stored on the network or which is in transit across, into or

out of the network.

TECHNICAL

4
New cards

consist of security policies and processes that control user behavior

ADMINISTRATIVE

5
New cards

is the foundation of effective security,

using encryption, authentication, and data integrity to protect

data and communications.

Cryptography

6
New cards

ensures that only intended recipients can read the data,

Encryption

7
New cards

checks detect any tampering during transmission.

authentication and integrity

8
New cards

helps verify identities and securely create symmetric session keys, which are then used to authenticate and decrypt data during secure sessions.

Public key cryptography

9
New cards

Cryptographic security can be applied either to the entire data

path or just parts of it, depending on security needs. __________ offers the highest protection, but securing only untrusted segments (like the Internet) may be

sufficient in some cases. z/OS provides flexible security protocols to protect either partial or full data paths.

END TO END SECURITY

10
New cards

In making a security protocol selection, an important

consideration is the application workload to be protected. In

order to illustrate this concept, it is helpful to understand where

various protocols are implemented from a protocol layering

perspective.

WORKLOAD-BASED SECURITY

11
New cards

is a network security device that controls traffic based on

security rules, and Cisco provides both threat-focused and unified threat

management (UTM) firewall solutions.

Firewall

12
New cards

actively blocks attacks by analyzing network traffic and using global threat intelligence to detect, stop, and track malicious activity and malware across the network.

intrusion prevention system (IPS)

13
New cards

protects distributed workloads across cloud and

hybrid environments by securing their larger attack surfaces without

compromising business agility.

Workload security

14
New cards

is a cloud-native platform that integrates the Cisco Secure

portfolio with your infrastructure to significantly reduce dwell time and

manual tasks.

SecureX

15
New cards

software-defined segmentation classifies network traffic based on endpoint identity, enabling easier enforcement of security policies by assigning access rights based on roles, locations, and other factors while isolating suspicious devices.

Network Segmentation

16
New cards

encrypts the connection between an

endpoint and a network, typically using IPsec or SSL to authenticate remote-

access communications over the internet.

virtual private network (VPN)

17
New cards

identifies users and devices to enforce

security policies, blocking or limiting access for noncompliant endpoints to

protect the network.

Network access control (NAC)

18
New cards

malware, including viruses, worms,

Trojans, ransomware, and spyware, can remain dormant after infection, so

advanced antimalware programs continuously monitor files to detect

anomalies, remove threats, and repair damage.

Anti-virus and anti-malware software

19
New cards

involves protecting the hardware, software, and

processes used to safeguard business applications from vulnerabilities that

attackers could exploit to infiltrate the network.

Application security

20
New cards

Behavioral analytics tools detect abnormal network

activity by identifying deviations from normal behavior, helping security teams

spot indicators of compromise and quickly address potential threats.

Behavioral Analytics

21
New cards

encompasses technologies, policies, and applications that

protect online IP, services, and data, helping secure user access and safeguard data and applications in the cloud.

Cloud security

22
New cards

technologies help organizations prevent staff

from sending sensitive information outside the network by blocking unsafe

actions like uploading, forwarding, or printing critical data.

Data loss prevention (DLP)

23
New cards

email gateways are a major threat vector for security

breaches, with attackers using phishing tactics to deliver malware, and email

security applications block incoming threats and control outbound messages

to protect sensitive data.

Email Security

24
New cards

wireless networks are less secure than wired ones, and

without proper security measures, a wireless LAN can be as vulnerable as

exposed Ethernet ports; specialized products are needed to protect the

network from exploitation.

Wireless Security