chapter security + 4th chapter

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/63

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

64 Terms

1
New cards

Protocol Analyzer

A tool that captures and inspects network traffic to troubleshoot issues and detect malicious activity.

2
New cards

Intrusion Detection System (IDS)

Monitors network or host activity and alerts administrators when suspicious or malicious behavior is detected.

3
New cards

Intrusion Prevention System (IPS)

Monitors traffic and actively blocks or rejects malicious traffic in real time.

4
New cards

Active IDS

An IDS that automatically responds to threats instead of only alerting.

5
New cards

HIDS (Host-based IDS)

Monitors activity on a single host such as logs, files, and system calls.

6
New cards

NIDS (Network-based IDS)

Monitors traffic across a network segment.

7
New cards

Signature-Based IDS

Detects attacks by matching activity to known attack signatures.

8
New cards

Signature-Based IPS

Blocks traffic that matches known malicious signatures.

9
New cards

Heuristic-Based HIDS

Detects threats using rules and behavior patterns rather than signatures.

10
New cards

Anomaly-Based HIDS

Detects threats by identifying deviations from a normal baseline.

11
New cards

False Positive

Benign activity incorrectly identified as malicious.

12
New cards

False Negative

Malicious activity that goes undetected.

13
New cards

IDS vs IPS

IDS detects and alerts while IPS detects and blocks.

14
New cards

Baseline

A known normal behavior state used for comparison.

15
New cards

Honeypot

A decoy system designed to attract attackers.

16
New cards

Honeynet

A network of honeypots used for attack analysis.

17
New cards

Honeyfile

A fake file used to detect unauthorized access.

18
New cards

Honeytoken

A fake credential or data item used to detect misuse.

19
New cards

Wireless Access Point (AP)

Connects wireless devices to a wired network.

20
New cards

SSID

Service Set Identifier, the name of a wireless network.

21
New cards

SSID Broadcast

Advertising the SSID so devices can discover the network.

22
New cards

Wireless Footprinting

Identifying wireless networks, signal ranges, and security settings.

23
New cards

Channel Overlap Map

A diagram showing overlapping wireless channels that cause interference.

24
New cards

Architectural Diagram

A visual layout showing network components and their connections.

25
New cards

WPA2

A wireless security protocol using AES encryption.

26
New cards

WPA3

A more secure wireless protocol protecting against password and replay attacks.

27
New cards

AES

Advanced Encryption Standard used for strong encryption.

28
New cards

CCMP

An AES-based encryption protocol providing confidentiality and integrity.

29
New cards

Open Mode

Wireless mode with no authentication.

30
New cards

PSK (Pre-Shared Key)

A shared password used for authentication.

31
New cards

Enterprise Mode

Uses individual authentication via 802.1X and RADIUS.

32
New cards

802.1X

Port-based network access control.

33
New cards

RADIUS

A centralized authentication, authorization, and accounting service.

34
New cards

RADIUS Federation

Trust relationship allowing authentication across organizations.

35
New cards

RADIUS Port

UDP 1812 for authentication and UDP 1813 for accounting.

36
New cards

EAP

Extensible Authentication Protocol framework.

37
New cards

PEAP

EAP method that protects credentials inside a TLS tunnel.

38
New cards

Captive Portal

A web login page required before network access.

39
New cards

Disassociation Attack

Forces a wireless client to disconnect and reauthenticate.

40
New cards

WPS

Wi-Fi Protected Setup that weakens security.

41
New cards

Rogue Access Point

An unauthorized access point on a network.

42
New cards

Evil Twin

A fake access point impersonating a legitimate one.

43
New cards

Wireless Jamming Attack

Disrupts wireless communication using interference.

44
New cards

Initialization Vector (IV)

A random value used to prevent encryption repetition.

45
New cards

IV Attack

Exploits weak or reused IVs to break encryption.

46
New cards

Wireless Replay Attack

Capturing and retransmitting valid wireless traffic.

47
New cards

Near Field Communication (NFC)

Short-range wireless communication technology.

48
New cards

NFC Jamming Attack

Disrupting NFC communication with interference.

49
New cards

RFID

Radio Frequency Identification technology.

50
New cards

Active RFID Tag

An RFID tag with its own power source.

51
New cards

Passive RFID Tag

An RFID tag powered by the reader.

52
New cards

RFID Eavesdropping

Intercepting RFID communications.

53
New cards

RFID Cloning

Copying RFID data to impersonate a tag.

54
New cards

RFID Denial of Service

Preventing RFID systems from functioning.

55
New cards

Bluetooth

Short-range wireless communication protocol.

56
New cards

Bluejacking

Sending unsolicited messages over Bluetooth.

57
New cards

Bluesnarfing

Stealing data from a Bluetooth device.

58
New cards

Bluebugging

Gaining remote control of a Bluetooth device.

59
New cards

VPN

Virtual Private Network that encrypts traffic.

60
New cards

Remote Access VPN

Allows users to securely connect to a private network.

61
New cards

BPDU Guard

A switch feature that disables ports receiving unauthorized BPDUs.

62
New cards

Baseline Detection

System that compares activity to normal behavior trends.

63
New cards

Raspberry Pi Device

A small, low-cost general-purpose computer.

64
New cards

Explore top flashcards

Ropa
Updated 650d ago
flashcards Flashcards (48)
Cold War People
Updated 650d ago
flashcards Flashcards (21)
BESC 320 Final
Updated 965d ago
flashcards Flashcards (82)
Cold War
Updated 26m ago
flashcards Flashcards (293)
Ropa
Updated 650d ago
flashcards Flashcards (48)
Cold War People
Updated 650d ago
flashcards Flashcards (21)
BESC 320 Final
Updated 965d ago
flashcards Flashcards (82)
Cold War
Updated 26m ago
flashcards Flashcards (293)