2.0 Tools and Technologies Flashcards
A table or data file that specifies whether a user or group has access to a specific resource on a computer or network.
ACL
A combination of hardware and software filters placed between trusted and untrusted networks intended to protect a network from attack by hackers who could gain access through public networks, including the Internet.
Firewall
A condition that states that unless otherwise given, the permission will be denied.
Implicit deny
Firewall that filters packets based on the full context of a given network connection.
Stateful Firewall
Firewall that is designed to protect networks based on static information such as source and destination.
Stateless Firewall
Firewall that are designed to protect the public-facing servers providing specific applications
Application-based Firewall
Firewall that controls traffic going in and out of a network.
Network-based Firewall
A set of protocols that enable encryption, authentication, and integrity over IP. IPSec is commonly used with virtual private networks (VPNs) and operates at Layer 3.
IPSec
An IPSec header used to provide connectionless integrity and data origin authentication for IP datagrams and to provide protection against replays.
Authentication Header (AH)
A technology used to securely connect to an organization’s internal network by tunneling unsecure protocols and data over a secure connection through an unsecure external network, such as the internet, to secure a device.
VPN (Virtual Private Network)
An IPSec header used to provide a mix of security services in IPv4 and IPv6. ESP can be used alone or in combination with the IP Authentication Header (AH).
ESP (Encapsulating Security Payload)
A system that is not only responsible for detecting network attacks based upon certain traffic characteristics, but also has the ability to prevent and stop attacks upon detection.
NIPS (Network Intrusion Prevention System)
A system that detects network attacks based upon certain traffic characteristics.
NIDS (Network Intrusion Detection System)
A system that uses signatures to scan for attacks or viruses and then alerts the administrator.
Signature-based System
A system that relies on an established pattern of behavior, typically through the establishment of a usage baseline, in order to detect unusual patterns, such as network attacks or misuse.
Heuristic/Behavioral Based System
A system that relies on an established pattern of behavior, typically through the establishment of a usage baseline, in order to detect unusual patterns, such as network attacks or misuse.
Anomoly/Behavioral Based System
A system that combines the best of both anomoly-based and signature-based systems.
Heuristic Based System
A flagged event that isn’t really an event and has been falsely triggered.
False Positive
An event that should be flagged but isn’t.
False Negative
A hardware device used to connect physically separate local area networks. These devices direct traffic based upon logical Internet protocol addresses, and also eliminate broadcast domains, since broadcasts cannot normally cross router connections to different networks.
Router
A method used on some routers to protect against spoofing attacks . A common implementation is to implement specific rules to block certain traffic.
Antispoofing
A network device that can replace a router or hub in a local network and get data from a source to a destination. Switching allows for higher speeds.
Switch
The “Data Link Layer” identifies devices on the physical layer.
MAC addresses and Bridges operate at the Data Link Layer
Layer 2
The “Network Layer” moves packets between computers on different networks.
Routers, IP, IPX operate at the “Network Layer”
Layer 3
A method of preventing switching loop or bridge loop problems.
STP and RSTP prevent switching loops.
Loop Prevention
A structuire of thwarting flood attacks.
On Switches, a flood guard thwarts MAC flood attacks.
On routers, a flood guard prevents SYN Flood Attacks.
Flood Guard
A type of system that prevents direct communication between a client and a host by acting as an intermediary.
Proxy
A device or software that recognizes application-specific commands and offers granular control over them.
Application Proxy
Dividing a load for greater efficiency of management among multiple devices.
Load Balancer
Scheduling method used with load balancers. It uses client IP addresses to ensure the client is redirected to the same server during a session.
Affinity
Scheduling method used with load balancers. It redirects each client request to servers in a predetermined order.
Round-Robin
The point at which access to a network is accomplished. This term is often used in relation to a wireless access point (WAP).
AP (Access Point)
The Service Set Identifier (SSID) is used by the access point of a wireless LAN to identify itself and is intended to be unique for a particular area/entity on a network.
SSID
Form if NAC to allow or block access based on the MAC address.
Its configured on switches for port security or on AP’s for wireless security.
MAC Filtering