Network Security Fundementals

0.0(0)
studied byStudied by 0 people
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/33

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

34 Terms

1
New cards

auditing

The process of reviewing records of network computer activity; these records identify who is connecting to a computer, the resources being requested, and whether access is granted or blocked.

2
New cards

authentication

The process of verifying the identity of a user, computer, or service.

3
New cards

availability

The assurance that authorized users can access resources in a reliable and timely manner.

4
New cards

back doors

Ways of gaining unauthorized access to a computer or other resource, such as an unused port or terminal service.

5
New cards

basic authentication

An authentication method that uses a username/password pair to verify the identity of the user requesting access.

6
New cards

biometrics

A method of authenticating a user using physical information, such as retinal scans, fingerprints, or voiceprints.

7
New cards

botnets

Networks of computers owned by unsuspecting victims of exploitation and controlled from a central system.

8
New cards

challenge/response authentication

An authentication method in which one party presents a question, called the challenge, and the other party must provide the correct response, usually a password, to be granted access.

9
New cards

confidentiality

Preventing intentional or unintentional disclosure of data during its creation, transmission, and storage.

10
New cards

crackers

Hackers who break into systems with the intent of doing harm or destroying data.

11
New cards

Defense in Depth (DiD)

A strategy for achieving information security that uses multiple layers of defense.

12
New cards

Demilitarized Zone (DMZ)

A semitrusted subnet that lies outside the trusted internal network but is connected to the firewall to make services publicly available while still protecting the internal LAN.

13
New cards

Discretionary Access Control

An access control method that allows users to share information with other users; however, the risk of unauthorized disclosure is higher than with the MAC method.

14
New cards

Distributed Denial of Service

An attack in which many computers are hijacked and used to flood the target with so many false requests that the server cannot process them all, and normal traffic is blocked.

15
New cards

Intrusion Detection and Prevention System (IPS)

A network security measure that can consist of applications and hardware devices deployed on the network, hosts, or both to prevent, detect, and respond to traffic interpreted as an intrusion.

16
New cards

logic bomb

Malware designed to be used at a specific time in the future or when a specified condition exists.

17
New cards

macro

A type of script that automates repetitive tasks in Microsoft Word or similar applications.

18
New cards

Mandatory Access Control (MAC)

An access control method that defines an uncompromising manner for how information can be accessed. With the MAC method, all access capabilities are defined in advance.

19
New cards

Nonrepudiation

The capability to prevent one participant in an electronic transaction from denying that it performed an action.

20
New cards

packet filters

Hardware or software tools that allow or deny packets based on specified criteria, such as port, IP address, or protocol.

21
New cards

packet monkeys

A derogatory term for unskilled crackers or hackers who steal program code and use it in denial of service attacks instead of creating the programs themselves.

22
New cards

permissive policy

A general approach to security that calls for a firewall and associated components to allow all traffic by default, blocking only specified traffic on a case-by-case basis.

23
New cards

port

An area in random access memory (RAM) reserved for the use of a program that “listens” for requests for the service it provides.

24
New cards

restrictive policy

A general approach to security that calls for a firewall and associated components to deny all traffic by default, allowing only specified traffic on a case-by-case basis.

25
New cards

Role Based Access Control (RBAC)

An access control method that establishes organizational roles to control access to information. The method limits access by job function or job responsibility.

26
New cards

script kiddie

A young, inexperienced computer programmer who spreads viruses and other malicious scripts and exploits weaknesses in computer systems using tools and techniques created by others.

27
New cards

scripts

Executable code attached to e-mail messages or downloaded files that is used to infiltrate a system.

28
New cards

signature files

Files used by antivirus programs that contain patterns of known viruses and malware.

29
New cards

signatures

Signs of possible attacks that include an IP address, a port number, and the frequency of access attempts; an IDPS uses signatures to detect possible attacks.

30
New cards

sockets

The end point of a computer-to-computer connection defined by an IP address and port address.

31
New cards

trojan program

A harmful computer program that appears to be something useful to deceive a user into installing it.

32
New cards

VPN

A cost-effective way for networks to create a secure private connection using public lines (usually the Internet). VPN endpoints establish connections (tunnels) to transmit and receive data, and then tear down the connections when they are no longer needed. Combinations of encryption, authentication, and encapsulation help ensure the confidentiality, privacy, and integrity of information.

33
New cards

virus scanning

The process of examining files or messages for filenames, patterns, extensions, and other indications that a virus or other malware is present.

34
New cards

worm

Computer files that copy themselves repeatedly and consume disk space or other resources. Worms do not require user intervention to be launched; they are self-propagating.