Domain 3.0 Implementation

studied byStudied by 1 person
0.0(0)
learn
LearnA personalized and smart learning plan
exam
Practice TestTake a test on your terms and definitions
spaced repetition
Spaced RepetitionScientifically backed study method
heart puzzle
Matching GameHow quick can you match all your cards?
flashcards
FlashcardsStudy terms and definitions

1 / 272

encourage image

There's no tags or description

Looks like no one added any tags here yet for you.

273 Terms

1

CASB (v2)

Cloud Access Security Broker (CASB) is a software that enforces security policies, monitors traffic for encryption and malicious content, and ensures compliance with the company's security policy.

New cards
2

DNSSEC

Domain Name System Security Extensions (DNSSEC) secures DNS traffic, protects against DNS server poisoning, and uses digital signatures for zone files.

New cards
3

SSH

Secure Shell (SSH) is a cryptographic network protocol for secure remote access, operating services securely over unsecured networks.

New cards
4

S/MIME

Secure/Multipurpose Internet Mail Extensions (S/MIME) secures emails by encrypting and digitally signing them.

New cards
5

SRTP

Provides encryption, message authorization, and integrity for audio and video over IP networks.

New cards
6

LDAPS

Lightweight Directory Access Protocol over SSL (LDAPS) secures directory services information, like Active Directory Domain Services, using port 636.

New cards
7

Hypertext Transfer Protocol over SSL/TLS (HTTPS)

ensures secure web browsing using port 443.

New cards
8

SFTP

SSH File Transfer Protocol (SFTP) encrypts file transfers using SSH, ensuring secure FTP downloads on port 22.

New cards
9

FTPS

Securely downloads large files using ports 989/990.

New cards
10

SNMP v3

Simple Network Management Protocol, version 3 (SNMP v3) remotely monitors and configures SNMP entities, like network devices, using ports 161/162 and UDP.

New cards
11

Kerberos

An authentication protocol providing two-way authentication using tickets, securing authentication on port 88.

New cards
12

IPsec

Internet Protocol Security (IPsec) secures VPN sessions between hosts using UDP on port 500.

New cards
13

SMTPS

Secure Simple Mail Transfer Protocol (SMTPS) secures SMTP for email using TLS on port 587.

New cards
14

Post Office Protocol Secure (POP3S)

Encrypted version of POP3, securing email retrieval on port 995.

New cards
15

IMAPS

IMAP over SSL/TLS (IMAPS) allows email clients to access email securely on port 993.

New cards
16

Session Initiated Protocol (SIP)

Controls Internet telephony for voice, video, and messaging applications on ports 5060/5061.

New cards
17

AH Protocol

Authentication Header (AH) provides authentication without encryption in IPsec.

New cards
18

ESP Protocol

Encapsulating Security Payloads (ESP) provides data confidentiality and authentication in IPsec.

New cards
19

Tunnel Mode

IPsec mode where two IP headers are sent, protecting traffic between different networks.

New cards
20

Transport Mode

IPsec mode where the outer IP addresses determine the IPsec policy for end-to-end communications.

New cards
21

SRTP for voice and video

SRTP secures VOIP protocols using AES encryption for voice and video.

New cards
22

NTP

Network Time Protocol synchronizes clocks across the network securely using NTPsec.

New cards
23

Secure Email and Web Protocols

Use S/MIME, secure SMTP, IMAP, POP3 over SSL, and HTTPS for secure email and web browsing.

New cards
24

Secure File Transfer

Use FTPS for SSL-based file transfers or SFTP for SSH-based secure file transfers.

New cards
25

Directory Services

Use LDAP or LDAPS for secure reading and writing of directories over an IP network.

New cards
26

Secure Remote Access

Use SSH for encrypted terminal communication or IPsec for OSI Layer 3 security.

New cards
27

Secure Domain Name Resolution

Use DNSSEC to validate DNS responses and provide origin authentication and data integrity.

New cards
28

Secure Routing and Switching

Use SNMP v3, SSH, or HTTPS for encrypted communication and management of network devices.

New cards
29

Secure Network Address Allocation

Use NAT and secure DHCP to enhance security and prevent attacks like DHCP DoS.

New cards
30

Subscription Services

Automated subscriptions like antivirus software require continuous updates and specific firewall configurations.

New cards
31

Antivirus

Software designed to detect and remove viruses and malicious software from systems.

New cards
32

Anti-malware

Program protecting systems from various malware types, including viruses, Trojans, worms, and potentially unwanted programs.

New cards
33

EDR

Endpoint Detection & Response (EDR) is an Integrated Endpoint Security Solution that continuously monitors the endpoint to mitigate malicious cyber threats.

New cards
34

DLP

way to protect sensitive information and prevent its inadvertent disclosure, identifying, monitoring, and automatically protecting sensitive information in documents.

New cards
35

NGFW

Next-generation firewall (NGFW) combines Conventional Firewalls, Deep-packet inspection (DPI), IPS, and Application Level firewall, moving beyond Port/Protocol inspection and blocking.

New cards
36

HIPS

Host-based intrusion prevention system (HIPS) analyzes whole packets for known events, rejecting packets when detected, often installed on a host like a server.

New cards
37

HIDS

Host-based intrusion detection system (HIDS) analyzes packets for known events, generating log messages when detected, typically installed on a host like a server.

New cards
38

Host-based Firewall

An application firewall built into desktop Operating Systems, like Windows or Linux, restricting service/process access to prevent malicious interference.

New cards
39

Boot Integrity

Ensures hosts are protected during the boot process, safeguarding against attacks on the OS during boot.

New cards
40

UEFI

Newer replacement for BIOS, providing faster boot times, support for larger hard drives, and enhanced security features.

New cards
41

Measured boot

All components from firmware, applications, and software are measured and stored in a log file, enhancing security and trust in the boot process.

New cards
42

Boot Attestation

Shows proof of software integrity using boot configuration logs, ensuring the OS kernel has not been modified by malware.

New cards
43

TPM

Trusted Platform Module is a microchip providing basic security functions, primarily encryption keys, communicating with the system using a hardware bus.

New cards
44

Tokenization

Deemed more secure than encryption, it replaces sensitive data with random data, aiding in meeting compliance requirements like PCI DSS and HIPAA.

New cards
45

Hashing

Used to index and fetch items from a database, making searches faster by mapping data to where records are held.

New cards
46

Salting

Adds random text before hashing passwords to increase security and render rainbow tables ineffective.

New cards
47

Input validations

Ensures data entered is in the correct format, rejecting incorrect inputs to prevent attacks like buffer overflow and SQL injection.

New cards
48

Secure cookies

Setting the Secure Attribute flag in website code ensures cookies are only downloaded in secure HTTPS sessions, preventing session hijacking attacks.

New cards
49

HTTP Headers

Designed to transfer information between hosts and web servers, can be used for cross-site scripting attacks, prevented by HTTP Strict Transport Security (HSTS) headers.

New cards
50

Code Signing

Uses certificates to digitally sign scripts and executables, verifying their authenticity and confirming they are genuine.

New cards
51

Allow List

Enables only explicitly allowed applications to run, often used in Firewalls, IDS/IPS, and EDR systems.

New cards
52

Block List/Deny List

Prevents specified applications from running, used in Firewalls, IDS/IPS, and EDR systems for added security.

New cards
53

Network-based Intrusion Prevention System (NIPS)

Analyzes whole packets, including header and payload, to detect known events and takes action by rejecting the packet.

New cards
54

Intrusion Detection System (IDS) vs

While both operate at the Network Level, IPS takes action by rejecting packets, whereas IDS only logs threats.

New cards
55

Heuristic (IDS & IPS)

Utilizes AI to identify attacks without prior signatures, detecting unknown and emerging threats.

New cards
56

Anomaly (IDS & IPS)

Creates a baseline of normal activity to detect abnormal behavior, capable of identifying unknown and emerging threats.

New cards
57

Signature-Based (IDS & IPS)

Looks for specific traffic flow patterns to block traffic matching signatures, effective against known attack methods.

New cards
58

Inline (aka In-Band)

NIDS/NIPS placed near the firewall for additional security.

New cards
59

Passive mode (Out of Band)

Traffic does not pass through NIDS/NIPS; sensors and collectors forward alerts.

New cards
60

Sensors & Collectors

Placed on networks to alert NIDS of changes in traffic patterns.

New cards
61

Hardware Security Module (HSM)

Safeguards and manages digital keys, performs encryption functions.

New cards
62

Web Application Firewall (WAF)

Protects web apps by filtering HTTP traffic, defending against common attacks.

New cards
63

Next Generation Firewalls (NGFW)

Utilize deep-packet inspection and application-level inspection for enhanced security.

New cards
64

Stateful (Firewall)

Filters and monitors network traffic based on established connections stored in a state table.

New cards
65

Stateless

Filters network traffic based on individual packets without storing them, better at identifying unauthorized communications.

New cards
66

Network Address Translation (NAT) Gateway

Allows private subnets to communicate with public services, translating private IP addresses.

New cards
67

Content/URL Filter

Blocks content based on filters applied to requested webpage traffic.

New cards
68

Open Source vs

Open source provides freely available source code, while proprietary offers more support and functionality.

New cards
69

Hardware vs Software Firewalls

Hardware firewalls are purpose-built network devices, while software firewalls are installed on existing hardware.

New cards
70

Appliance vs

Appliance refers to hardware firewalls, host-based are software installed on host OS, and virtual firewalls are implemented in the cloud.

New cards
71

Access Control List (ACL)

Configuration used to allow or deny traffic on routers or firewalls.

New cards
72

Types of Network Devices

Firewalls filter traffic, switches repeat traffic, routers control traffic flow, and gateways connect networks with different protocols.

New cards
73

Quality of Service (QoS)

Prioritizes traffic based on importance and function to ensure applications have the necessary bandwidth.

New cards
74

IPv6 Addresses

With IPv6, there are significantly more IP addresses available compared to IPv4, leading to challenges in scanning numerous ports and reducing the need for port address translation.

New cards
75

Network Address Translation (NAT)

NAT is a security feature that provides indirect access to the source user, eliminating the Address Resolution Protocol (ARP) and ARP Poisoning in IPv6.

New cards
76

Port Mirroring

Also known as port spanning, it duplicates incoming data from one port to another device for real-time or later analysis.

New cards
77

Monitoring Services

Organizations utilize monitoring services, often through a Security Operations Center (SOC), for continuous network security monitoring and compliance maintenance.

New cards
78

File Integrity Monitors

These tools detect unauthorized changes in critical files, such as operating system files, to identify potential malicious activities.

New cards
79

Route Security

Involves encrypting routing information using protocols like IPSEC and SSL/TLS to enhance network security.

New cards
80

Broadcast Storm

A situation where excessive broadcast traffic overwhelms the network, causing disruptions in normal traffic flow.

New cards
81

BPDU Guard

Frames containing Spanning Tree Protocol (STP) information that help prevent network loops and ensure stable network operation.

New cards
82

Network Access Control (NAC)

A security process that restricts unauthorized users and devices from accessing a network, ensuring compliance with security policies.

New cards
83

DNS Spoofing

An attack where false DNS replies are sent to redirect traffic, bypassing legitimate DNS servers.

New cards
84

Fully-Qualified Domain Name (FQDN)

A complete domain name including the hostname and domain, like server1.contoso.com.

New cards
85

SOA Record

Start of Authority record that holds essential information about a DNS zone, such as the primary name server and domain administrator's email.

New cards
86

CNAME Record

Canonical Name record that creates an alias for one domain name to another, allowing DNS lookup redirection.

New cards
87

RRSIG Record Type

DNSSEC signature that secures DNS records against unauthorized modifications.

New cards
88

SPF

Sender Policy Framework (SPF) is a DNS text (TXT) record used to prevent spam and verify the legitimacy of the email sender's domain.

New cards
89

DMARC

Domain-based Message Authentication, Reporting, and Conformance (DMARC) is a DNS text (TXT) record used by ISPs to prevent malicious emails like phishing attacks.

New cards
90

VPN

Virtual Private Network (VPN) creates secure connections between devices or networks over insecure mediums like the internet.

New cards
91

SSL / TLS VPN

VPNs using SSL/TLS protocols for secure communication, often without firewall issues and supporting various operating systems.

New cards
92

Full Tunnel VPN

VPN configuration where all user data goes through an encrypted tunnel without direct communication outside the tunnel.

New cards
93

Split Tunnel

VPN configuration allowing some data to go through the VPN tunnel while other data communicates directly outside the tunnel.

New cards
94

Site-to-Site VPN

VPN connecting two networks using IPSec tunnel mode for always-on encrypted communication.

New cards
95

Remote Access VPN

VPN where users initiate connections for shorter durations, often using IPSec transport mode.

New cards
96

IPSec

Internet Protocol Security authenticates and encrypts data packets for secure communication, commonly used in VPNs.

New cards
97

VLAN

Virtual Local Area Network partitions and isolates broadcast domains in a network at the Data Link Layer (Layer 2).

New cards
98

Zero Trust

Security model where no entity is inherently trusted, and all requests must be verified, often using multifactor authentication and encryption.

New cards
99

Load Balancing

Distributes network traffic across multiple servers to prevent overloading a single server.

New cards
100

Round Robin

Load balancing algorithm that rotates servers by directing traffic to the next available server.

New cards

Explore top notes

note Note
studied byStudied by 8 people
132 days ago
5.0(1)
note Note
studied byStudied by 51 people
848 days ago
5.0(1)
note Note
studied byStudied by 577 people
862 days ago
5.0(13)
note Note
studied byStudied by 8 people
183 days ago
5.0(1)
note Note
studied byStudied by 5 people
121 days ago
5.0(1)
note Note
studied byStudied by 6 people
726 days ago
5.0(1)
note Note
studied byStudied by 79 people
741 days ago
5.0(1)
note Note
studied byStudied by 9204 people
699 days ago
4.4(27)

Explore top flashcards

flashcards Flashcard (30)
studied byStudied by 7 people
776 days ago
5.0(1)
flashcards Flashcard (85)
studied byStudied by 4 people
541 days ago
5.0(1)
flashcards Flashcard (46)
studied byStudied by 8 people
534 days ago
5.0(1)
flashcards Flashcard (31)
studied byStudied by 23 people
17 days ago
5.0(2)
flashcards Flashcard (20)
studied byStudied by 6 people
896 days ago
5.0(1)
flashcards Flashcard (85)
studied byStudied by 1 person
22 days ago
5.0(1)
flashcards Flashcard (30)
studied byStudied by 3 people
160 days ago
5.0(1)
flashcards Flashcard (45)
studied byStudied by 11 people
518 days ago
4.0(1)
robot