2.1 Network Security Flashcards
Analyze a scenario and integrate network and security components, concepts and architectures to meet security requirements
UTM
-Unified Threat Management
incorporates the functions of multiple network and security appliances into a single appliance
IDS/IPS
-Intrusion Detection System/Intrusion Protection System
NIDS/NIPS
- Network Intrusion Detection System/ Network Intrusion Prevention System
- identifies/prevents intrusion attempts by examining network traffic, potentially looking at both the header and contents of packets being transmitted
INE
- Inline Network Encryptor
- Devices that encrypt sensitive information en route between sources and destinations across insecure networks like the internet and company WAN links
NAC
- Network Access Control
- Improves network security by employing policies that mandate devices meet certain security minimums before granting network access
SIEM
- Security Information and Event Management
- Utilities analyze and correlate logs and events from mulitple sources as well as provide real-time alerting features
Switch
-network appliances that connect devices and workstations, servers, and printers together to form a network
Firewall
-Network firewalls are devices that evaluate incoming and outgoing traffic to determine if the traffic should be allowed or denied entry across a network boundary
Wireless Controller
- Network appliances or software solutions that enable administrators to centralize security configurations across multiple WAPs simultaneously
Router
- Devices that connect networks to networks in order to forward traffic based on network addresses such as IP addresses
Proxy Servers
-Hardware or software systems that act as connection intermediaries between internal clients and Internet resources
Load Balancers
-Devices or programs that distribute traffic across a group of similar servers known as server farm or pol, in order to increase performance and availability
HSM
- Hardware Security Modules
- Devices that provide key generation and safeguarding services, speed up specific cryptographic operations on platforms requiring strong authentication, and provide access control capabilities
MicroSD HSM
-Tiny HSM cards that plug into the microSD ports of smart devices such as android smart phones and tablets.
WAF
- Web Application Firewalls
- Specialize in the monitoring and filtering of unautherized and malicious traffic sent to and from web applications to provide them with protection against various internet threats
Passive Vulnerability Scanners
analyze network traffic in order to non-intrusively discover vulnerabilities with organizational assets
DAM
- Database activity monitors
- monitor the transations and other activity of database services
VPN
- Virtual private network
- Offers security by tunneling data across a network through the use of technology that offers a secure means of transport
IPSec
- Internet Port Security
- Suite of protocols for securing packets that traverse an IP network
SSL/TLS
- Secure Sockets Layer is a protocol for securing communication sessions over IP networks
- Transport Layer Security more powerful and relevant successor
SSH
- Secure Shell
- Protocol for obtaining a remote shell session with an operating system over a secured channel
- TCP Port 22
RDP
- Remote Desktop Protocol
- provides a secure, graphical, remote access connection over a network between computers using TCP port 3389
VNC
- Virtual Network Computing
- platform-independent graphical desktop sharing protocol that uses the Remote Frame Buffer (RFB) protocol
VDI
- Virtual Desktop Infrastructure
- Involves the hosting of a desktop OS within a virtual network environment on a centralized server