Lesson3 Flashcards
(17 cards)
Process of securing information data from unauthorized access
Information Security
Mechanism for maintaining control over the traffic
Firewall
Through certain points where we can inspect, filter, and control the traffic, often
referred to as a choke points.
Funnel Network Traffic
generally a combination of a network
design feature and a proactive device such as a firewall.
DMZ
We divide it into multiple smaller networks, each
acting as its own small network called a subnet.
Network segmentation
When we send data over networks that are not secure or trusted, an eavesdropper can glean a large amount of information from
what we send
Intercepting data
Looks at the contents of each packet in the traffic individually and makes a GROSS DETERMINATION, based on the source and destination IP addresses, the port number and the protocol being used, of whatever the traffic will be allowed to pass.
Packet Filtering
Function on the same general principle as packet filtering firewalls, but they are able to keep track of the traffic at a granular level.
Stateful Packet Inspection
are capable of analyzing the actual content of the traffic that is flowing
through them.
Deep Packet Inspection
These servers provide security and performance features GENERALLY FOR A PARTICULAR APPLICATION, such as mail or Web browsing.
Proxy Server
Types of Firewall
Packet Filtering
Stateful Packet Inspection
Deep Packet Inspection
Proxy Server
Dmz
Monitor the networks, hosts, or applications to which they are
connected for unauthorized activity.
Network Intrusion Detection
often referred to as a tunnel, is an encrypted connection between two points.
Virtual Private Network
one of the simplest way and easiest ways we can protect our data
is to use our ______
Secure Protocol
When we send data over networks that are not secure or trusted,
an eavesdropper can glean a large amount of information from
what we send
Intercepting data
Wireless networks freely broadcast our data for anyone with the appropriate
technology to hear.
Wireless network security
, commonly used to detect wireless access points and can find them even when attempts have been made to make doing so difficult.
Kismet