Cards #151 - 200 Flashcards
Full backup
complete, comprehensive backups of all files on a disk of server
Gateway
a bridge between two network
Hacker
unauthorized user who attempts to or gains access to an information system
Harassing
subject to aggressive pressure or intimidation
Hardware security
can be composed of adding cable locks to computers o prevent thieves from walking out with copies of customer database
Hash function
use one key for encryption and another for decrypting
Honeypot
computer system on the internet that is expressly set up to attract and “trap” intruders
Host integrity
the ability to define, enforce, and restore the security of client computers to keep enterprise networks and data secure
Host-based IDS
a software application installed on a system and monitors activity only on the local system (rely on information from audit and system log files to detect intrusion)
Hot site
up and operational 24/7 and would be able to take over functionally form a primary site within minutes of a primary site failure
How does NAT server help protect your network?
masking the IP addresses of internal computers from the internet
How does spyware differ from other forms of malware, such as worms and viruses
Not all spyware is malicious
HTTP
Hyper-Text Transfer Protocol. Used for websites
HTTPS
Hyper-Text Transfer Protocol over Secure Socket Layer. authentication of the server, the data transmitted over a HTTPS connection is encrypted and confidential
ICMP
Internet Control Message Protocol. used by a router to exchange information with other routers
Identification
identifying a person
Implicit deny
indicates that unless something is specifically allowed, it is denied
Bottleneck route
a network route that goes nowhere
RAID 1
data written identically to two drives, therefore producing a mirrored set
Incremental Backup
partial backup that stores only the info that has changed since the last full or incremental backup
Ingress filters
ensures that only packets with a valid source address from the originating network are allowed to pass
Instant Message
common communication using a computer. Opens listening ports on the computer, hence makes it vulnerable to network attacks and software exploits.
Internet
a global network connecting millions of computers; has more than 200 million users worldwide, and that number if growing rapidly
In-Private Filtering
filter potential unsafe websites you browse
Internet Key Exchange (IKE) protocol
Standard key exchange protocol for IPSec. COnsists of the Internet Security Association and Key Management Protocol
ISAKMP
Internet Security Association and Key Management Protocol. defines the procedures for peer authentication, the SA handshake process, and algorithms and key sizes
Intranet
A small private piece of ‘Internet’ that is accessible only to users within the organization.
Intrusion
Unauthorized act of bypassing the security mechanisms of a system
Intrusion Detection System (IDS)
monitors and analyzes traffic on a network or activity on a system in an attempt to detect malicious activity. Logs the event, stores relevant data/traffic, notifies an administrator, an din some cases it will try to intervene
Intrusion prevention policy
automatically detects and blocks network attacks and attacks on browsers as well as protects applications from vulnerabilities
IP
Internet Protocol. The main delivery system for information over the Internet
IP Addresses
a unique address that identifies a device on the internet or a local network
IPSec
Internet Protocol Security. A popular and complete encryption framework for IP networks that provides end-to end security at the Network layer. It provides data confidentiality, data integrity, and authentication of data origin
ISP
Internet Service Provider. a company that provides individuals and other companies access to the internet and other related services
Java
an object-oriented programming language developed by Sun Microsystems. It is platform-independent, which makes it suitable for writing Internet application