Chapter 10 Flashcards
When you divide a network into multiple smaller networks
Network Segmentation
Mechanism for maintaining control over the traffic that flows into and out of a network
Firewalls
IDS
Intrusion Detection Systems (IDS)
Hardware or software tools that monitor networks, hosts, or applications for unauthorized activity
Intrusion Detection Systems (IDS)
IPS
Intrusion Prevention Systems (IPS)
Refuses traffic from the source of an attack
Intrusion Prevention Systems (IPS)
Works like most antivirus systems
Signature-Based IDS
Works by first determining the normal kinds of traffic and activity taking place on a network and then measuring the present traffic against the baseline in order to detect patterns that aren’t present inn the traffic normally.
Anomaly-Based IDS
What is the method of protecting the traffic that flows through a network?
Encryption
WEP
Wired Equivalent Privacy
WPA, WPA2, WPA3
Wi-Fi Protected Access
Wi-Fi Protected Access 2
Wi-Fi Protected Access 3
VPN
Virtual Private Network
The simplest and easiest way to protect our data
Secure Protocols
FTP
File Transfer Protocol
POP
Post Office Protocol
Used to detect wireless access points. Can find them even when attempts have been made to make doing so difficult
Kismet
A handy tool for securing communications
Secure Shell (SSH)
SSH
ecure Shell
Used for discovering the networks and systems in an environment
Port Scanner
Nmap (A port scanner)
Network Mapper
A tool that can intercept traffic on a network. Listens for any traffic that your computer or device’s network interface can see.
Packet Sniffer
A fully featured sniffer capable of intercepting traffic from a wide variety of wired and wireless sources
Wireshark
A command-line packet sniffing tool
Tcpdump
Detects, monitors, and sometimes tampers with the activities of an attacker. (Creating fake vulnerabilities that would make the system attractive to an attacker)
Honeypots
Expanded Honeypots (Networks of Honeypots)
Honeynets
ICMP
Internet Control Message Protocol
A tool that can map the topology of firewalls and help locate vulnerabilities in them
Scapy (hping3?)