Chapter 10 Flashcards
When you divide a network into multiple smaller networks
Network Segmentation
Mechanism for maintaining control over the traffic that flows into and out of a network
Firewalls
IDS
Intrusion Detection Systems (IDS)
Hardware or software tools that monitor networks, hosts, or applications for unauthorized activity
Intrusion Detection Systems (IDS)
IPS
Intrusion Prevention Systems (IPS)
Refuses traffic from the source of an attack
Intrusion Prevention Systems (IPS)
Works like most antivirus systems
Signature-Based IDS
Works by first determining the normal kinds of traffic and activity taking place on a network and then measuring the present traffic against the baseline in order to detect patterns that aren’t present inn the traffic normally.
Anomaly-Based IDS
What is the method of protecting the traffic that flows through a network?
Encryption
WEP
Wired Equivalent Privacy
WPA, WPA2, WPA3
Wi-Fi Protected Access
Wi-Fi Protected Access 2
Wi-Fi Protected Access 3
VPN
Virtual Private Network
The simplest and easiest way to protect our data
Secure Protocols
FTP
File Transfer Protocol
POP
Post Office Protocol