1/17
These flashcards cover key concepts from the lecture on security technology, specifically focusing on firewalls and VPNs.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
What is the purpose of access control in computerized information systems?
To assess and manage whether and how to allow users into trusted regions of the organization.
What are the three categories of access controls?
Mandatory, Nondiscretionary, and Discretionary Access Controls.
What is Mandatory Access Control (MAC)?
A type of access control where users have limited control over access to information resources based on data classification techniques.
What does the term 'Discretionary Access Controls (DAC)' refer to?
Controls that are implemented at the data user's choice, allowing users to grant access to information at their discretion.
What are the four mechanisms that all access control systems rely on?
Identification, Authentication, Authorization, and Accountability.
What is the process of Authentication?
The process of verifying a supplicant's claimed identity.
What are the three common types of authentication factors?
Something the supplicant knows, possesses, or is.
What is the difference between Packet Filtering Firewalls and Application Firewalls?
Packet Filtering Firewalls inspect packet header information, while Application Firewalls operate at the application layer to filter traffic.
Define Stateful Inspection Firewalls.
Firewalls that keep track of the state of active connections and can differentiate between legitimate packets and malicious packets.
What does a Proxy Server do?
Acts as an intermediary for requests from clients seeking resources from other servers.
What are Virtual Private Networks (VPNs) used for?
To create a private and secure network connection over public networks.
List the three types of VPN technologies defined by the VPNC.
Trusted VPNs, Secure VPNs, and Hybrid VPNs.
What is a Demilitarized Zone (DMZ) in networking?
A network segment that serves as a buffer between an untrusted network and an organization's trusted internal network.
What is the main function of content filters?
To control access to material within a network and restrict users from accessing certain websites or content.
When using a firewall, what is the rule of 'deny all'?
Unless a particular action is expressly allowed, it is denied.
What is RADIUS used for in network security?
An authentication method for managing users who connect to a network via dial-up or VPN.
What role does Kerberos play in network security?
Kerberos provides secure third-party authentication using symmetric key encryption.
What are Transport and Tunnel Modes in VPNs?
Transport mode encrypts the data but not the packet header; Tunnel mode encrypts the entire packet.