Domain 3.0 Implementation

0.0(0)
Studied by 1 person
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/272

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 9:51 AM on 6/16/24
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

273 Terms

1
New cards

CASB (v2)

Cloud Access Security Broker (CASB) is a software that enforces security policies, monitors traffic for encryption and malicious content, and ensures compliance with the company's security policy.

2
New cards

DNSSEC

Domain Name System Security Extensions (DNSSEC) secures DNS traffic, protects against DNS server poisoning, and uses digital signatures for zone files.

3
New cards

SSH

Secure Shell (SSH) is a cryptographic network protocol for secure remote access, operating services securely over unsecured networks.

4
New cards

S/MIME

Secure/Multipurpose Internet Mail Extensions (S/MIME) secures emails by encrypting and digitally signing them.

5
New cards

SRTP

Provides encryption, message authorization, and integrity for audio and video over IP networks.

6
New cards

LDAPS

Lightweight Directory Access Protocol over SSL (LDAPS) secures directory services information, like Active Directory Domain Services, using port 636.

7
New cards

Hypertext Transfer Protocol over SSL/TLS (HTTPS)

ensures secure web browsing using port 443.

8
New cards

SFTP

SSH File Transfer Protocol (SFTP) encrypts file transfers using SSH, ensuring secure FTP downloads on port 22.

9
New cards

FTPS

Securely downloads large files using ports 989/990.

10
New cards

SNMP v3

Simple Network Management Protocol, version 3 (SNMP v3) remotely monitors and configures SNMP entities, like network devices, using ports 161/162 and UDP.

11
New cards

Kerberos

An authentication protocol providing two-way authentication using tickets, securing authentication on port 88.

12
New cards

IPsec

Internet Protocol Security (IPsec) secures VPN sessions between hosts using UDP on port 500.

13
New cards

SMTPS

Secure Simple Mail Transfer Protocol (SMTPS) secures SMTP for email using TLS on port 587.

14
New cards

Post Office Protocol Secure (POP3S)

Encrypted version of POP3, securing email retrieval on port 995.

15
New cards

IMAPS

IMAP over SSL/TLS (IMAPS) allows email clients to access email securely on port 993.

16
New cards

Session Initiated Protocol (SIP)

Controls Internet telephony for voice, video, and messaging applications on ports 5060/5061.

17
New cards

AH Protocol

Authentication Header (AH) provides authentication without encryption in IPsec.

18
New cards

ESP Protocol

Encapsulating Security Payloads (ESP) provides data confidentiality and authentication in IPsec.

19
New cards

Tunnel Mode

IPsec mode where two IP headers are sent, protecting traffic between different networks.

20
New cards

Transport Mode

IPsec mode where the outer IP addresses determine the IPsec policy for end-to-end communications.

21
New cards

SRTP for voice and video

SRTP secures VOIP protocols using AES encryption for voice and video.

22
New cards

NTP

Network Time Protocol synchronizes clocks across the network securely using NTPsec.

23
New cards

Secure Email and Web Protocols

Use S/MIME, secure SMTP, IMAP, POP3 over SSL, and HTTPS for secure email and web browsing.

24
New cards

Secure File Transfer

Use FTPS for SSL-based file transfers or SFTP for SSH-based secure file transfers.

25
New cards

Directory Services

Use LDAP or LDAPS for secure reading and writing of directories over an IP network.

26
New cards

Secure Remote Access

Use SSH for encrypted terminal communication or IPsec for OSI Layer 3 security.

27
New cards

Secure Domain Name Resolution

Use DNSSEC to validate DNS responses and provide origin authentication and data integrity.

28
New cards

Secure Routing and Switching

Use SNMP v3, SSH, or HTTPS for encrypted communication and management of network devices.

29
New cards

Secure Network Address Allocation

Use NAT and secure DHCP to enhance security and prevent attacks like DHCP DoS.

30
New cards

Subscription Services

Automated subscriptions like antivirus software require continuous updates and specific firewall configurations.

31
New cards

Antivirus

Software designed to detect and remove viruses and malicious software from systems.

32
New cards

Anti-malware

Program protecting systems from various malware types, including viruses, Trojans, worms, and potentially unwanted programs.

33
New cards

EDR

Endpoint Detection & Response (EDR) is an Integrated Endpoint Security Solution that continuously monitors the endpoint to mitigate malicious cyber threats.

34
New cards

DLP

way to protect sensitive information and prevent its inadvertent disclosure, identifying, monitoring, and automatically protecting sensitive information in documents.

35
New cards

NGFW

Next-generation firewall (NGFW) combines Conventional Firewalls, Deep-packet inspection (DPI), IPS, and Application Level firewall, moving beyond Port/Protocol inspection and blocking.

36
New cards

HIPS

Host-based intrusion prevention system (HIPS) analyzes whole packets for known events, rejecting packets when detected, often installed on a host like a server.

37
New cards

HIDS

Host-based intrusion detection system (HIDS) analyzes packets for known events, generating log messages when detected, typically installed on a host like a server.

38
New cards

Host-based Firewall

An application firewall built into desktop Operating Systems, like Windows or Linux, restricting service/process access to prevent malicious interference.

39
New cards

Boot Integrity

Ensures hosts are protected during the boot process, safeguarding against attacks on the OS during boot.

40
New cards

UEFI

Newer replacement for BIOS, providing faster boot times, support for larger hard drives, and enhanced security features.

41
New cards

Measured boot

All components from firmware, applications, and software are measured and stored in a log file, enhancing security and trust in the boot process.

42
New cards

Boot Attestation

Shows proof of software integrity using boot configuration logs, ensuring the OS kernel has not been modified by malware.

43
New cards

TPM

Trusted Platform Module is a microchip providing basic security functions, primarily encryption keys, communicating with the system using a hardware bus.

44
New cards

Tokenization

Deemed more secure than encryption, it replaces sensitive data with random data, aiding in meeting compliance requirements like PCI DSS and HIPAA.

45
New cards

Hashing

Used to index and fetch items from a database, making searches faster by mapping data to where records are held.

46
New cards

Salting

Adds random text before hashing passwords to increase security and render rainbow tables ineffective.

47
New cards

Input validations

Ensures data entered is in the correct format, rejecting incorrect inputs to prevent attacks like buffer overflow and SQL injection.

48
New cards

Secure cookies

Setting the Secure Attribute flag in website code ensures cookies are only downloaded in secure HTTPS sessions, preventing session hijacking attacks.

49
New cards

HTTP Headers

Designed to transfer information between hosts and web servers, can be used for cross-site scripting attacks, prevented by HTTP Strict Transport Security (HSTS) headers.

50
New cards

Code Signing

Uses certificates to digitally sign scripts and executables, verifying their authenticity and confirming they are genuine.

51
New cards

Allow List

Enables only explicitly allowed applications to run, often used in Firewalls, IDS/IPS, and EDR systems.

52
New cards

Block List/Deny List

Prevents specified applications from running, used in Firewalls, IDS/IPS, and EDR systems for added security.

53
New cards

Network-based Intrusion Prevention System (NIPS)

Analyzes whole packets, including header and payload, to detect known events and takes action by rejecting the packet.

54
New cards

Intrusion Detection System (IDS) vs

While both operate at the Network Level, IPS takes action by rejecting packets, whereas IDS only logs threats.

55
New cards

Heuristic (IDS & IPS)

Utilizes AI to identify attacks without prior signatures, detecting unknown and emerging threats.

56
New cards

Anomaly (IDS & IPS)

Creates a baseline of normal activity to detect abnormal behavior, capable of identifying unknown and emerging threats.

57
New cards

Signature-Based (IDS & IPS)

Looks for specific traffic flow patterns to block traffic matching signatures, effective against known attack methods.

58
New cards

Inline (aka In-Band)

NIDS/NIPS placed near the firewall for additional security.

59
New cards

Passive mode (Out of Band)

Traffic does not pass through NIDS/NIPS; sensors and collectors forward alerts.

60
New cards

Sensors & Collectors

Placed on networks to alert NIDS of changes in traffic patterns.

61
New cards

Hardware Security Module (HSM)

Safeguards and manages digital keys, performs encryption functions.

62
New cards

Web Application Firewall (WAF)

Protects web apps by filtering HTTP traffic, defending against common attacks.

63
New cards

Next Generation Firewalls (NGFW)

Utilize deep-packet inspection and application-level inspection for enhanced security.

64
New cards

Stateful (Firewall)

Filters and monitors network traffic based on established connections stored in a state table.

65
New cards

Stateless

Filters network traffic based on individual packets without storing them, better at identifying unauthorized communications.

66
New cards

Network Address Translation (NAT) Gateway

Allows private subnets to communicate with public services, translating private IP addresses.

67
New cards

Content/URL Filter

Blocks content based on filters applied to requested webpage traffic.

68
New cards

Open Source vs

Open source provides freely available source code, while proprietary offers more support and functionality.

69
New cards

Hardware vs Software Firewalls

Hardware firewalls are purpose-built network devices, while software firewalls are installed on existing hardware.

70
New cards

Appliance vs

Appliance refers to hardware firewalls, host-based are software installed on host OS, and virtual firewalls are implemented in the cloud.

71
New cards

Access Control List (ACL)

Configuration used to allow or deny traffic on routers or firewalls.

72
New cards

Types of Network Devices

Firewalls filter traffic, switches repeat traffic, routers control traffic flow, and gateways connect networks with different protocols.

73
New cards

Quality of Service (QoS)

Prioritizes traffic based on importance and function to ensure applications have the necessary bandwidth.

74
New cards

IPv6 Addresses

With IPv6, there are significantly more IP addresses available compared to IPv4, leading to challenges in scanning numerous ports and reducing the need for port address translation.

75
New cards

Network Address Translation (NAT)

NAT is a security feature that provides indirect access to the source user, eliminating the Address Resolution Protocol (ARP) and ARP Poisoning in IPv6.

76
New cards

Port Mirroring

Also known as port spanning, it duplicates incoming data from one port to another device for real-time or later analysis.

77
New cards

Monitoring Services

Organizations utilize monitoring services, often through a Security Operations Center (SOC), for continuous network security monitoring and compliance maintenance.

78
New cards

File Integrity Monitors

These tools detect unauthorized changes in critical files, such as operating system files, to identify potential malicious activities.

79
New cards

Route Security

Involves encrypting routing information using protocols like IPSEC and SSL/TLS to enhance network security.

80
New cards

Broadcast Storm

A situation where excessive broadcast traffic overwhelms the network, causing disruptions in normal traffic flow.

81
New cards

BPDU Guard

Frames containing Spanning Tree Protocol (STP) information that help prevent network loops and ensure stable network operation.

82
New cards

Network Access Control (NAC)

A security process that restricts unauthorized users and devices from accessing a network, ensuring compliance with security policies.

83
New cards

DNS Spoofing

An attack where false DNS replies are sent to redirect traffic, bypassing legitimate DNS servers.

84
New cards

Fully-Qualified Domain Name (FQDN)

A complete domain name including the hostname and domain, like server1.contoso.com.

85
New cards

SOA Record

Start of Authority record that holds essential information about a DNS zone, such as the primary name server and domain administrator's email.

86
New cards

CNAME Record

Canonical Name record that creates an alias for one domain name to another, allowing DNS lookup redirection.

87
New cards

RRSIG Record Type

DNSSEC signature that secures DNS records against unauthorized modifications.

88
New cards

SPF

Sender Policy Framework (SPF) is a DNS text (TXT) record used to prevent spam and verify the legitimacy of the email sender's domain.

89
New cards

DMARC

Domain-based Message Authentication, Reporting, and Conformance (DMARC) is a DNS text (TXT) record used by ISPs to prevent malicious emails like phishing attacks.

90
New cards

VPN

Virtual Private Network (VPN) creates secure connections between devices or networks over insecure mediums like the internet.

91
New cards

SSL / TLS VPN

VPNs using SSL/TLS protocols for secure communication, often without firewall issues and supporting various operating systems.

92
New cards

Full Tunnel VPN

VPN configuration where all user data goes through an encrypted tunnel without direct communication outside the tunnel.

93
New cards

Split Tunnel

VPN configuration allowing some data to go through the VPN tunnel while other data communicates directly outside the tunnel.

94
New cards

Site-to-Site VPN

VPN connecting two networks using IPSec tunnel mode for always-on encrypted communication.

95
New cards

Remote Access VPN

VPN where users initiate connections for shorter durations, often using IPSec transport mode.

96
New cards

IPSec

Internet Protocol Security authenticates and encrypts data packets for secure communication, commonly used in VPNs.

97
New cards

VLAN

Virtual Local Area Network partitions and isolates broadcast domains in a network at the Data Link Layer (Layer 2).

98
New cards

Zero Trust

Security model where no entity is inherently trusted, and all requests must be verified, often using multifactor authentication and encryption.

99
New cards

Load Balancing

Distributes network traffic across multiple servers to prevent overloading a single server.

100
New cards

Round Robin

Load balancing algorithm that rotates servers by directing traffic to the next available server.