Protecting the Organization Flashcards
Module 4 (20 cards)
IPS
Intrusion prevention systems
uses a set of traffic signatures that match and block malicious traffic and attacks
IPS
Let remote employees use a secure encrypted tunnel from their mobile computer and securely connect back to the organization’s network.
VPN (Virtual Private Network)
Uses signatures or behavioral analysis of applications to identify and block malicious code from being executed
Antimalware/Antivirus
Looks deeper into the network traffic itself and identify malicious behavior that has to be blocked
Firewalls
is installed in next generation Cisco routers, firewalls, IPS devices and web and email security appliances. It can also be installed as software in host computers.
Cisco’s Advanced Malware Protection (AMP)
a VPN system that lets remote workers use a secure encrypted tunnel from their mobile computer to securely connect back to the organization’s network. All Cisco security appliances are equipped with a VPN server and client technology, designed for secure encrypted tunneling.
Cisco’s AnyConnect Secure Mobility Client
a next generation firewall that has all the capabilities of an ISR router, as well as advanced network management and analytics. It can help you to see what’s happening on the network so that you can detect attacks earlier.
Cisco’s Firepower 4100 Series
these routers have many capabilities, including traffic filtering, the ability to run an intrusion prevention system (IPS), encryption and VPN capabilities for secure encrypted tunneling.
Cisco Integrated Services Router (ISR) 4000
this firewall filters communications based on source and destination IP addresses.
Network layer firewall
this firewall filters communications based on source and destination data ports, as well as connection states.
Transport layer firewall
this firewall filters communications based on an application, program or service.
Application layer firewall
this firewall filters communications based on the user, device, role, application type and threat profile.
Context aware layer firewall
this firewall filters web content requests like URLs, domain names and media types.
Proxy server
this firewall is placed in front of web servers, reverse proxy servers protect, hide, offload and distribute access to web servers.
Reversed proxy server
this firewall hides or masquerades the private addresses of network hosts.
Network address translation (NAT) firewall
this firewall filters ports and system service calls on a single computer operating system.
Host-based firewall
a process of probing a computer, server or other network host for open ports.
Port Scanning
IDS
Intrusion detection system
security measures deployed on a network to detect and prevent malicious activities.
IDS/IPS