Final Study Deck Flashcards
(74 cards)
The practices, policies, and technologies implemented to protect a
computer network and the data transmitted over it from unauthorized access, misuse, modification, or denial of service.
Network security
encompasses various measures designed to ensure the confidentiality, integrity, and availability
of network resources and information.
Network security
A network ________ is a security device or software application that monitors and controls
incoming and outgoing network traffic based on predetermined security rules.
firewall
Its primary function is to establish a barrier between a trusted internal network and untrusted
external networks, such as the internet, to prevent unauthorized access and protect against various
cyber threats.
a
firewall
An ________ is a security mechanism designed to monitor network
traffic, system activities, and events for signs of unauthorized or malicious behavior.
IDS (Intrusion Detection System)
operates by analyzing network packets, system logs, and other data sources to detect known attack signatures, abnormal patterns, or suspicious activities that may indicate a security incident.
IDS (Intrusion Detection System)
When a/n ________ identifies potential threats or anomalies, it generates alerts or notifications to prompt further investigation by security personnel.
IDS (Intrusion Detection System)
An __________ is a proactive security solution that not only detects
but also actively blocks or prevents malicious activities and attacks in real-time.
IPS (Intrusion Prevention System)
It operates similarly to an IDS by analyzing network traffic and system events for signs of threats. However, in addition to generating alerts, a/n __________ can take immediate action to block malicious traffic, quarantine compromised hosts, or apply access control policies to prevent further damage.
IPS (Intrusion Prevention System)
A ______________ is a technology that creates a secure and encrypted connection over a less secure network, such as the internet.
Virtual Private Network (VPN)
Allows users to securely access private networks and resources from remote locations as if they were directly connected to the network’s local area.
Virtual Private Network (VPN)
Network __________ is the process of dividing a computer network into smaller, isolated segments or subnetworks to enhance security, performance, and manageability.
segmentation
Instead of having a single, flat network where all devices communicate freely with each other, _________ creates boundaries or zones within the network, limiting the scope of communication and access between different segments.
segmentation
Each ________ in the process known as __________ typically represents a logical grouping of devices based on factors such as
function, location, or security requirements.
segment/segmentation
A ______________ attack is a malicious attempt to disrupt the normal functioning of a targeted system, network, or service by overwhelming it with a flood of illegitimate traffic or requests.
Denial-of-Service (DoS)
The primary goal of a _________attack is to render the targeted resource unavailable to legitimate users, causing downtime, service degradation, or complete unavailability.
Denial-of-Service (DoS)
Distributed Denial-of-Service (DDoS) attacks are a variant of DoS attacks where multiple compromised computers, known as ________ are coordinated to launch simultaneous attacks
against a single target.
Botnets
This attack consist of devices infected with malware that enables the attacker to remotely control them and use them to generate and send malicious traffic to the target.
Distributed Denial-of-Service (DDoS)
harnesses the combined resources of numerous compromised devices, to produce large volumes of traffic and inflict significant damage to a network/target
Distributed Denial-of-Service (DDoS)
refers to vulnerabilities in the client-side components of a web application that can be exploited by attackers to compromise the security of the application.
CLIENT-SIDE SECURITY CONTROL FAILURE
Intercept and modify HTTP/S requests and responses between a web browser and the target application. This feature is useful for inspecting and modifying web traffic to identify vulnerabilities. (BurpSuite)
WEB APPLICATION PROXY
A _______ is a period of interaction between a user and an application, typically starting when a user logs in and ending when they log out or their session expires due to inactivity.
Session
____________ in application security refers to the process of securely managing user sessions within a web application.
Session Management
A small piece of data sent from a website and stored on a user’s device by the web browser while the user is browsing
Cookie