Section 4

studied byStudied by 1 person
0.0(0)
Get a hint
Hint

Barriers that intercept and inspect network traffic to protect networks from unauthorized access.

1 / 106

encourage image

There's no tags or description

Looks like no one added any tags here yet for you.

107 Terms

1

Barriers that intercept and inspect network traffic to protect networks from unauthorized access.

Firewalls

New cards
2

Firewalls that operate at Layers 3 and 4 of the OSI network model and inspect attributes such as protocol, IP addresses, and port numbers to determine whether to allow or deny traffic.

Packet Filters

New cards
3

Devices that act as intermediaries between systems, changing IP addresses and port numbers to facilitate communication between networks.

Circuit-Level Gateways

New cards
4

Feature in firewalls that allows them to identify and track the connection state of conversations between computers, reducing the number of rules needed to support TCP communication.

Stateful Inspection

New cards
5

Firewalls that have the ability to inspect the contents of packets, providing a deeper level of inspection and preventing malicious traffic from entering the network unchecked.

Application Level

New cards
6

Advanced security solutions that monitor the network to detect threats based on a database of known behaviors and payload signatures.

Intrusion Detection Systems (IDS)

New cards
7

Advanced security solutions that intercept and block suspicious traffic based on a database of known behaviors and payload signatures.

Intrusion Prevention Systems (IPS)

New cards
8

Operating mode for IDS devices where they attach to the network as passive listeners, alerting network administrators of any suspicious behavior.

Tap Mode

New cards
9

Operating mode for IPS devices where they are positioned in the middle of the traffic stream to intercept and block suspicious traffic.

In-Line Mode

New cards
10

Method used by IPS devices to block traffic, particularly files known to carry viruses or malware, based on the frequency of such files being found to be malicious.

Reputation-Based Protection

New cards
11

Virtualized versions of IDS and IPS devices that can be deployed on virtualized environments.

Virtual Appliances

New cards
12

IPS and IDS applications that are installed on servers or workstations to provide intrusion detection and prevention capabilities.

Host-Based IPS/IDS Applications

New cards
13

A conceptual framework that defines the way computers communicate over networks, consisting of seven layers that represent different parts of the computer-to-computer communication process.

OSI Model

New cards
14

The layer of the OSI model that includes protocols, such as 802.3 Ethernet and 802.11 Wi-Fi, which define how computers can share access to a common medium.

Layer 2 (Data Link)

New cards
15

The process of identifying and resolving problems or issues that may arise in a network, such as network connectivity issues.

Troubleshooting

New cards
16

The process of analyzing a network for security threats and vulnerabilities in order to identify potential risks and take appropriate measures to mitigate them.

Network Security Assessment

New cards
17

A set of rules and guidelines that govern the communication between devices in a network.

Protocol

New cards
18

Functions or processes provided by a network that enable communication and other operations.

Services

New cards
19

Weaknesses or flaws in a network's security that can be exploited by attackers to gain unauthorized access or cause harm.

Vulnerabilities

New cards
20

Potential dangers or risks to a network's security, such as malware, unauthorized access, or data breaches.

Threats

New cards
21

The layer of the OSI model that represents the physical medium that connects computers together, such as cables or fiber optic cables.

Layer 1: Physical

New cards
22

A Layer 1 threat that involves tampering with the physical cables of a victim's network to intercept and listen to network traffic.

Wiretapping

New cards
23

The layer of the OSI model that defines how computers logically connect to the network and includes protocols such as Ethernet and Wi-Fi.

Layer 2: Data Link

New cards
24

A Layer 2 attack that uses radio signals to interfere with a victim's wireless network card, preventing communication with a wireless access point.

Radio jammer attack

New cards
25

The layer of the OSI model that allows computers on different networks to exchange data and includes protocols such as IP and ICMP.

Layer 3: Network

New cards
26

An attack at Layer 3 that sends pings to a large number of IP addresses to detect which computers are online and vulnerable to other attacks.

Ping sweep attack

New cards
27

The layer of the OSI model that ensures data is delivered according to the needs of the application and includes protocols such as TCP and UDP.

Layer 4: Transport

New cards
28

A tool used to scan a computer for open ports, which can be used by attackers to identify services running on a victim's computer.

Port scanner

New cards
29

The layer of the OSI model that allows computers to differentiate between connections within a service on the same host, such as remote procedure call (RPC).

Layer 5: Session

New cards
30

The layer of the OSI model that serves as a translation and security layer between applications, allowing for data encoding and encryption.

Layer 6: Presentation

New cards
31

An attack at Layer 6 that involves an attacker intercepting and impersonating the encryption between a victim and a target, such as a bank's website.

Man-in-the-middle attack

New cards
32

The final layer of the OSI model that defines how users connect with application services through protocols such as HTTP, and is host to various attacks.

Layer 7: Application

New cards
33

a tool used by security professionals to detect problems and known bad code that result in vulnerabilities in your applications. It can help you identify weaknesses that could lead to SQL injection attacks, buffer overrun attacks, and a variety of others that may allow an attacker to take control of your server.

Vulnerability scanner

New cards
34

Encryption method that uses the same key for both encrypting and decrypting data.

Symmetric key encryption

New cards
35

Encryption method that uses different keys for encrypting and decrypting data.

Asymmetric key encryption

New cards
36

System that allows secure exchange of encrypted data without prior key exchange by using public and private key pairs.

Public Key Infrastructure (PKI)

New cards
37

Encrypted data block created using a private key to verify the integrity and authenticity of data.

Digital signature

New cards
38

Encryption protocol that combines symmetric and asymmetric key encryption for secure data transmission.

Transport Layer Security (TLS)

New cards
39

Asymmetric key creation method that utilizes the algebraic structure of elliptic curves for stronger encryption.

Elliptic Curve Cryptography (ECC)

New cards
40

The process of converting data into a secure and unreadable form to protect it from unauthorized access.

Encryption

New cards
41

Data that is moving through a network, such as when it is being transmitted between devices.

Data in transit

New cards
42

Data that is stored on a disk or in a permanent or semi-permanent state.

Data at rest

New cards
43

The encryption of data both in transit and at rest, ensuring that the data is never stored or transmitted in a readable form.

End-to-end encryption

New cards
44

Secure Sockets Layer (SSL) and Transport Layer Security (TLS) are common forms of encryption used on the internet to create a secure channel between a client and a server.

SSL/TLS encryption

New cards
45

Internet Protocol Security (IPsec) provides authentication and encryption for IP network traffic, commonly used to create VPN tunnels across untrusted networks.

IPsec encryption

New cards
46

A symmetric key cipher used for bulk encryption of data at rest, known for its high level of security and near-impenetrable encryption.

Advanced Encryption Standard (AES)

New cards
47

A part of IPsec that provides data integrity for the connection

Authentication Header (AH) protocol

New cards
48

A part of IPsec that provides encryption for the connection

encapsulating security payload (ESP)

New cards
49

A part of IPsec that define the algorithms to be used and the key exchange method

security associations (SA)

New cards
50

The process of categorizing data based on its security sensitivity and determining the policies and requirements for handling and storing the data.

Data Classification

New cards
51

Policies that dictate the length of time data should be stored, whether in active storage or archive copies, to ensure compliance and avoid fines.

Retention Policies

New cards
52

Requirements that specify the physical or geographical location where data must reside, often seen in government organizations to protect public records.

Data Residency Requirements

New cards
53

Measures and practices implemented to safeguard data from loss, unauthorized access, or damage, including backup and restore processes.

Data Protection

New cards
54

A plan or strategy for creating copies of data to protect against data loss, often involving regular backups and testing of the restore process.

Backup Solution

New cards
55

The process of encrypting data when it is stored or saved in a storage device or server to protect it from unauthorized access.

Data encryption at rest

New cards
56

The key used to encrypt and decrypt data at rest. If obtained by an attacker, it can be used to access and modify the data.

Data encryption key (DEK)

New cards
57

An asymmetric encryption key used to encrypt the DEK. It helps protect the DEK and is stored in a key management server (KMS).

Key encryption key (KEK)

New cards
58

A server that stores and manages encryption keys, including the encrypted DEK. It grants access to the DEK based on the validity of the KEK.

Key management server (KMS)

New cards
59

The process of encrypting data when it is being transmitted or sent over a network to protect it from unauthorized interception or manipulation.

Encryption of data in transit

New cards
60

Another term for data in transit, referring to data that is being transmitted or sent over a network.

Data in flight

New cards
61

A network connection that connects different locations or networks over a wide geographic area, such as the connection between private and public clouds in a hybrid cloud environment.

Wide area network (WAN) link

New cards
62

An authentication service that allows internet users to authenticate to an application using federated identity servers at sites like Google, Facebook, and Twitter, eliminating the need for users to create unique credentials for each application.

Federated Identity Management

New cards
63

The process of determining who should have access to data and what level of access they should have, often assigning permissions to groups rather than individual user accounts.

Access Control

New cards
64

The practice of isolating publicly accessible servers from the rest of the network to minimize the impact of attacks, such as hosting them in a public cloud or within an extranet in a private cloud.

Network Isolation

New cards
65

Security systems implemented within an extranet or network to detect and prevent server-to-server attacks, often used in conjunction with firewalls to enhance network security.

Intrusion Prevention Systems (IPS)

New cards
66

A secure, encrypted connection established over a public network, such as the internet, to allow remote management of servers in a public cloud environment without directly exposing them to the internet.

Virtual Private Network (VPN)

New cards
67

An authentication method that requires the use of multiple forms of identification, such as something you know (username and password), something you are (biometrics), or something you have (token or device), to verify the user's identity.

Multifactor authentication (MFA)

New cards
68

An account used by applications to access resources within a cloud provider, authenticated using API keys instead of a username and password.

Service account

New cards
69

Detailed records of actions taken by users and services within a cloud provider's system, used for accountability, change tracking, and detecting unauthorized use of privileged credentials.

Audit logs

New cards
70

A scalable, single-tenant cluster of computing, storage, and networking resources owned and maintained by a single company, with the company being responsible for the hardware and physical data center security.

Private cloud

New cards
71

Cloud services hosted by companies like Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform (GCP), with the cloud provider being responsible for the physical data center security and most hardware security concerns.

Public cloud

New cards
72

A combination of services running in both public and private clouds, with security concerns falling on the owners of the equipment and the data link between the public and private cloud networks potentially being maintained and secured by a third party.

Hybrid cloud

New cards
73

A Wi-Fi network that does not require a password or key to connect, making it accessible to anyone in the vicinity. Data transmitted on open networks is unencrypted and visible to anyone with a wireless network card.

Open Wi-Fi Network

New cards
74

An encryption algorithm that uses a 56-bit key to encrypt data. It is now considered antiquated and insecure, as it can be compromised by brute force methods in less than a day.

Data Encryption Standard (DES)

New cards
75

A symmetric encryption algorithm that uses the DES algorithm three times in a row to encrypt data. While it increases the complexity of encryption, it can still be compromised, especially as more data is sent in a single session.

Triple Data Encryption Standard (3DES)

New cards
76

A highly secure form of encryption widely used today. It can use a 128-bit, 192-bit, or 256-bit key, with longer key lengths providing stronger security.

Advanced Encryption Standard (AES)

New cards
77

An early wireless security standard that aimed to provide the same level of security as a wired network. It uses a 40-bit or 104-bit encryption key, which can be easily compromised using brute force methods. It has been deprecated and is no longer recommended.

Wired Equivalent Privacy (WEP)

New cards
78

A wireless security standard designed to overcome the weaknesses of WEP. It uses a variable-length alphanumeric passphrase and employs the Temporal Key Integrity Protocol (TKIP) to generate a new encryption key for each packet, enhancing security compared to WEP.

Wi-Fi Protected Access (WPA)

New cards
79

The successor to WPA, introduced in 2004. It supports the Counter Mode Cipher Block Chaining Message Authentication Code Protocol (CCMP), which is based on the AES encryption standard. It became the standard for wireless security for over a decade.

WPA2

New cards
80

The latest wireless security standard, released in 2018. IT increases the minimum key strength for enterprise mode connections and eliminates the use of passphrases for personal-mode networks. It also implements forward secrecy and encrypts management frames for improved security.

WPA3

New cards
81

A security standard that provides network access control at the port level, whether physical or wireless, and uses authentication based on the Extensible Authentication Protocol (EAP).

802.1x

New cards
82

An authentication standard used in 802.1x that provides a framework for various authentication methods, including username and password or public key infrastructure (PKI) certificates.

Extensible Authentication Protocol (EAP)

New cards
83

The process of controlling access to a network based on the authentication and authorization of users and devices.

Network Access Control

New cards
84

A protocol used in 802.1x authentication that allows for centralized authentication, authorization, and accounting for network access.

Remote Authentication Dial-In User Service (RADIUS)

New cards
85

Rules and criteria set by a network administrator that determine the level of access and privileges granted to a user or device on a network.

Authorization Policies

New cards
86

Software programs designed to detect and remove malicious software, such as viruses, worms, and trojans, from a computer system.

Malware Scanners

New cards
87

The set of guidelines, policies, and configurations established by a company to ensure consistency and security across its network and systems.

Corporate Standard

New cards
88

A denial-of-service (DoS) attack where the attacker forces clients off of a wireless network, even without being on the network themselves.

Deauth Attack

New cards
89

The latest security protocol for wireless networks that encrypts management packets, providing better defense against deauth attacks.

WPA3 Security

New cards
90

An attack where the attacker sets up a rogue wireless network without security or authentication, allowing them to intercept and modify unencrypted data.

Fake Access

New cards
91

A secure connection established between a device and a VPN service, encrypting all traffic sent and received over a wireless network.

VPN Tunnel

New cards
92

Public wireless networks that do not require authentication or encryption, posing a significant security risk and should be avoided.

Unsecured Wi-Fi Hotspots

New cards
93

The process of confirming a person's identity, which can be done through usernames and passwords or certificates.

Authentication

New cards
94

The process of determining what a user is allowed to access, such as specific resources, servers, or files.

Authorization

New cards
95

The process of verifying access control settings, providing a forensic trail after a security breach, and storing logs or records in an immutable form.

Accounting

New cards
96

An optional add-on to the authentication process that requires additional factors, such as a PIN, facial or retinal scan, or fingerprint, to verify a user's identity.

MFA (Multi-factor Authentication)

New cards
97

The process of strengthening the security settings and defenses of network devices, servers, and workstations to protect against unauthorized access, data breaches, and other potential threats.

Harden Devices

New cards
98

The pre-configured passwords that come with network devices, which should be changed immediately to prevent unauthorized access.

Default Passwords

New cards
99

User accounts on network devices that are not actively used or needed, which should be removed to reduce the risk of unauthorized access.

Unnecessary Logins

New cards
100

A policy that requires users to create complex passwords with a combination of uppercase and lowercase letters, numbers, and special symbols, and to change their passwords regularly to enhance security.

Strong Password Policy

New cards

Explore top notes

note Note
studied byStudied by 4 people
... ago
5.0(1)
note Note
studied byStudied by 21 people
... ago
5.0(1)
note Note
studied byStudied by 21 people
... ago
5.0(1)
note Note
studied byStudied by 1 person
... ago
5.0(1)
note Note
studied byStudied by 6 people
... ago
5.0(1)
note Note
studied byStudied by 31 people
... ago
5.0(1)
note Note
studied byStudied by 6 people
... ago
5.0(1)
note Note
studied byStudied by 674 people
... ago
5.0(4)

Explore top flashcards

flashcards Flashcard (63)
studied byStudied by 22 people
... ago
5.0(1)
flashcards Flashcard (85)
studied byStudied by 14 people
... ago
5.0(1)
flashcards Flashcard (183)
studied byStudied by 7 people
... ago
5.0(1)
flashcards Flashcard (20)
studied byStudied by 1 person
... ago
5.0(1)
flashcards Flashcard (34)
studied byStudied by 21 people
... ago
5.0(1)
flashcards Flashcard (58)
studied byStudied by 17 people
... ago
5.0(1)
flashcards Flashcard (58)
studied byStudied by 12 people
... ago
5.0(2)
flashcards Flashcard (76)
studied byStudied by 452 people
... ago
5.0(7)
robot