CH 19 BB Flashcards
What is physical security? Pg 897
Physical barriers that bar unwanted personnel entering an environment. Example: Locked doors, securing physical documents, biometrics, badges, key fobs, and privacy filters.
Why are locked doors not a guaranteed security system? Pg 897
Tailgating
What is multifactor authentication? Pg 899
Anytime more than one item(factor) is required to authenticate a user.
What is a packet filter firewall? Pg 901
Passes or blocks traffic based on the packet’s addressing information(port).
What is a proxy firewall? Pg 901
Used to process requests from an outside network. Proxy firewalls examine the data and makes a rule-based decision about whether the request should be forwarded or refused.
T/F The best method of protection is to use a layered approach. Pg 900
True.
What are stateful inspection firewalls? Pg 902
Uses a table that tracks all communications channels to determine whether or not a packet that is being sent was requested from the internal network.
T/F DoS attacks have no adverse affect on stateful inspection firewalls. Pg 903
False. DoS and DDoS attacks can overload this type of firewall and cause it to crash and have to shutdown/reboot.
Why is user education important? Pg 905
All employees in your network must understand why it is important to not open suspicious files and scan every disk/email/document that they receive before they open it.
What are AUPs? Pg 905
Acceptable User Policies describe how the employees in an organization can use company systems and resources, both software and hardware. Can be thought of as similar to protocols.
What is the principle of least priviledge? Pg 906
Only assigning users the minimum amount of permissions they need to complete their work.
What is email filtering? Pg 906
Filtering out certain emails before passing it on. Spam filters are a form of email filtering.
What are VPNs? Pg 906
Virtual Private Networks work by sending private data across a public network by placing (encapsulating) that data into other packets. This process is known as tunneling.
T/F VPNs appear as public networks. Pg 907
False. VPNs are created over public networks but the connection logically appears to be part of a local network.
What is social engineering? Pg 907
An attacker attempts to acquire information by social means, such as talking to people in the organization.