C836 Ch.10 Flashcards
Security in network design
This method of security involves a well-configured and patched network, and incorporating elements such as network segmentation, choke points, and redundancy
Network segmentation
The act of dividing a network into multiple smaller networks, each acting as its own small network (subnet)
Choke points
Certain points in the network, such as routers, firewalls, or proxies, where we can inspect, filter, and control network traffic
Redundancy
A method of security that involves designing a network to always have another route if something fails or loses connection
Firewall
A mechanism for maintaining control over the traffic that flows into and out of our networks
Packet filtering
A firewall technology that inspects the contents of each packet in network traffic individually and makes a gross determination (based on source and destination IP address, port number, and the protocol being used) of whether the traffic should be allowed to pass
Stateful packet inspection
A firewall technology that functions on the same general principle as packet filtering firewalls, but is able to keep track of the traffic at a granular level. Has the ability to watch the traffic over a given connection
Deep packet inspection
A firewall technology that can analyze the actual content of the traffic that is flowing through
Proxy server
A specialized type of firewall that can serve as a choke point, log traffic for later inspection, and provide a layer of security for the devices behind it
Demilitarized Zone (DMZ)
A combination of a network design feature and a protective device such as a firewall; often used for systems that need to be exposed to external networks but are connected to our network (such as a web server)
Network intrusion detection system (NIDS)
A system that monitors the network to which it is connected for unauthorized activity
Signature-based IDS
An intrusion detection system that maintains a database of signatures that might signal a particular type of attack and compares incoming traffic to those signatures
Anomaly-based IDS
An intrusion detection system that takes a baseline of normal network traffic and activity and measures current traffic against this baseline to detect unusual events
Bring your own device (BYOD)
A phrase that refers to an organization’s strategy and policies regarding the use of personal vs. corporate devices
Mobile device management (MDM)
A solution that manages security elements for mobile devices in the workplace