6.7 Flashcards
What defines the protection of the networks as a whole, individual devices, data, and even network users?
Network Security
What type of deployment model is designated for use by the general public and exists on the cloud provider’s property?
Public Clouds
What are electronic documents of credentials usually signed by a third party called a Certification Authority (CA)?
Certificate
What is a form of one-way encryption where data of variable length is input to an algorithm and a value of fixed length results are output?
Hashing
What are six types of malware discussed in class? (More info on pg. 107)
- Virus
- Worm
- Macro
- Trojan
- Rootkit
- Adware/Spyware
What is defined as any program or code designed to perform an undesired function on a system?
Malicious Software (Malware)
What protocol handles authentication services for IPsec and allows the recipient of a message to verify the identity of the sender?
Authentication Header (AH)
What are the three types of access?
- Physical Access
- Logical Access
- Remote Access
What type of service model defines the customer use of applications running from a cloud provider?
Software as a Service (SaaS) (Email distribution gmail, yahoo, hotmail)
Type of encryption that uses a different key for encryption than is used for decryption.
Assymmetric Encryption
What is defined as something that has the potential to damage the network, to include data, hosts, or users?
Threat
What kind of deployment model defines one specific company or organization using the entire cloud infrastructure?
Private Cloud
What is the analysis and practice of concealing information and securing sensitive data?
Cryptography
What is created in order to allow remote connections from the Internet into the private network?
VPN Tunnel
What is it called when additional processing can be handled outside of the normal cloud infrastructure and into another?
Cloud bursting
What acts as a gateway into the network inside of RADIUS?
Network Access Server (NAS)
Which mode of IPsec provides the most security by enabling the security functions between any two communicating devices or end-points?
Transport mode
What AAA standard is used in supporting thousands of access points managed by Internet Service Providers (ISPs) and linking them to a single database?
Remote Authentication Dial-In User Service (RADIUS)
What are two types of encryption?
Symmetric Encryption and Asymmetric Encryption
What are the modes of protection provided by IPsec?
Transport Mode and Tunnel Mode