Security Technology: Firewalls and VPNs

0.0(0)
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/17

flashcard set

Earn XP

Description and Tags

These flashcards cover key concepts from the lecture on security technology, specifically focusing on firewalls and VPNs.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

18 Terms

1
New cards

What is the purpose of access control in computerized information systems?

To assess and manage whether and how to allow users into trusted regions of the organization.

2
New cards

What are the three categories of access controls?

Mandatory, Nondiscretionary, and Discretionary Access Controls.

3
New cards

What is Mandatory Access Control (MAC)?

A type of access control where users have limited control over access to information resources based on data classification techniques.

4
New cards

What does the term 'Discretionary Access Controls (DAC)' refer to?

Controls that are implemented at the data user's choice, allowing users to grant access to information at their discretion.

5
New cards

What are the four mechanisms that all access control systems rely on?

Identification, Authentication, Authorization, and Accountability.

6
New cards

What is the process of Authentication?

The process of verifying a supplicant's claimed identity.

7
New cards

What are the three common types of authentication factors?

Something the supplicant knows, possesses, or is.

8
New cards

What is the difference between Packet Filtering Firewalls and Application Firewalls?

Packet Filtering Firewalls inspect packet header information, while Application Firewalls operate at the application layer to filter traffic.

9
New cards

Define Stateful Inspection Firewalls.

Firewalls that keep track of the state of active connections and can differentiate between legitimate packets and malicious packets.

10
New cards

What does a Proxy Server do?

Acts as an intermediary for requests from clients seeking resources from other servers.

11
New cards

What are Virtual Private Networks (VPNs) used for?

To create a private and secure network connection over public networks.

12
New cards

List the three types of VPN technologies defined by the VPNC.

Trusted VPNs, Secure VPNs, and Hybrid VPNs.

13
New cards

What is a Demilitarized Zone (DMZ) in networking?

A network segment that serves as a buffer between an untrusted network and an organization's trusted internal network.

14
New cards

What is the main function of content filters?

To control access to material within a network and restrict users from accessing certain websites or content.

15
New cards

When using a firewall, what is the rule of 'deny all'?

Unless a particular action is expressly allowed, it is denied.

16
New cards

What is RADIUS used for in network security?

An authentication method for managing users who connect to a network via dial-up or VPN.

17
New cards

What role does Kerberos play in network security?

Kerberos provides secure third-party authentication using symmetric key encryption.

18
New cards

What are Transport and Tunnel Modes in VPNs?

Transport mode encrypts the data but not the packet header; Tunnel mode encrypts the entire packet.