2.0 Tools and Technologies Flashcards
(86 cards)
A table or data file that specifies whether a user or group has access to a specific resource on a computer or network.
ACL
A combination of hardware and software filters placed between trusted and untrusted networks intended to protect a network from attack by hackers who could gain access through public networks, including the Internet.
Firewall
A condition that states that unless otherwise given, the permission will be denied.
Implicit deny
Firewall that filters packets based on the full context of a given network connection.
Stateful Firewall
Firewall that is designed to protect networks based on static information such as source and destination.
Stateless Firewall
Firewall that are designed to protect the public-facing servers providing specific applications
Application-based Firewall
Firewall that controls traffic going in and out of a network.
Network-based Firewall
A set of protocols that enable encryption, authentication, and integrity over IP. IPSec is commonly used with virtual private networks (VPNs) and operates at Layer 3.
IPSec
An IPSec header used to provide connectionless integrity and data origin authentication for IP datagrams and to provide protection against replays.
Authentication Header (AH)
A technology used to securely connect to an organization’s internal network by tunneling unsecure protocols and data over a secure connection through an unsecure external network, such as the internet, to secure a device.
VPN (Virtual Private Network)
An IPSec header used to provide a mix of security services in IPv4 and IPv6. ESP can be used alone or in combination with the IP Authentication Header (AH).
ESP (Encapsulating Security Payload)
A system that is not only responsible for detecting network attacks based upon certain traffic characteristics, but also has the ability to prevent and stop attacks upon detection.
NIPS (Network Intrusion Prevention System)
A system that detects network attacks based upon certain traffic characteristics.
NIDS (Network Intrusion Detection System)
A system that uses signatures to scan for attacks or viruses and then alerts the administrator.
Signature-based System
A system that relies on an established pattern of behavior, typically through the establishment of a usage baseline, in order to detect unusual patterns, such as network attacks or misuse.
Heuristic/Behavioral Based System
A system that relies on an established pattern of behavior, typically through the establishment of a usage baseline, in order to detect unusual patterns, such as network attacks or misuse.
Anomoly/Behavioral Based System
A system that combines the best of both anomoly-based and signature-based systems.
Heuristic Based System
A flagged event that isn’t really an event and has been falsely triggered.
False Positive
An event that should be flagged but isn’t.
False Negative
A hardware device used to connect physically separate local area networks. These devices direct traffic based upon logical Internet protocol addresses, and also eliminate broadcast domains, since broadcasts cannot normally cross router connections to different networks.
Router
A method used on some routers to protect against spoofing attacks . A common implementation is to implement specific rules to block certain traffic.
Antispoofing
A network device that can replace a router or hub in a local network and get data from a source to a destination. Switching allows for higher speeds.
Switch
The “Data Link Layer” identifies devices on the physical layer.
MAC addresses and Bridges operate at the Data Link Layer
Layer 2
The “Network Layer” moves packets between computers on different networks.
Routers, IP, IPX operate at the “Network Layer”
Layer 3