CH9- Intro to Network Security Flashcards
Documents used in encryption and authentication protocols that identify a person or computer and can be verified by a certification authority
Digital certificate
Spreads by replicating itself into programs or documents
Virus - malicious corrupting files
Monopolizes network services or bandwidth from legitimate users
DoS (Denial of service) -
Inspects packets as they go in or out of a network or computer
Firewall - discards or forwards based on rules
A series of letters, numbers, and special characters, like a password, that both devices use to authenticate each other’s identity
Pre-shared key -
Malware that is activated when a particular event occurs
Logic bomb - time-dependent
A self-contained self-replicating program
Worm - uses network services like email to spread
Packets are denied on context as well as packet properties
Stateful packet inspection - in context to an on-going conversation
Used to discover breaches in security
IDS (Intrusion detection system) - can counter attacks in progress
Permits access to computer, bypasses normal authentication
Backdoor -