Chapter 10 Flashcards
What are the 3 types of authentication mechanisms with an example? (!!)
- Something a person knows: PIN
- Something a person has: Card
- Something a person can produce: Fingerprint
What 3 human characteristics are truly unique?
- Fingerprints
- Eye retina
- Eye iris
How are biometric technologies evaluated?
-False Reject Rate (Type I Error): not very serious, unless it hinders productivity.
-False Accept Rate (Type II Error): very serious and can cause a breach.
-Crossover Error Rate (Equal Error Rate): represents the balance between the 2 error rates.
What’s a Firewall?
A device that monitors information when moving in or out of the network.
It can be a computer system, server, network, etc.
What are the 4 most common types of firewalls?
-Packet Filtering Firewalls: filters by examining packet headers.
-Application Layer Proxy Firewalls: Works like packet filtering firewall, but at the application layer. And provides both a firewall and proxy.
-Stateful Packet Inspection Firewalls (SPI): uses a state table to keep track of network connections.
-Unified Threat Management (UTM) Devices: can perform deep packet inspection, and able to perform the work of a SPI firewall.
How do you select the right firewall?
-does it have a good balance between protection and cost?
-What are the features included in the base price, and features at extra cost.
-Is the firewall easy to configure?
-Can it adapt to a growing network?
What is a content filter?
A tool that allows restriction of content coming in the network, commonly used to block websites that are not business related.
How does IPS technology prevent attacks?
- Stopping the attack by terminating the connection.
- Reconfiguring the network to block access.
- Changing the attacks content to make it not harmful. (ex: removing malware from an email before it reaches its recepient)
Name 4 types of IDPS’s:
-Host-Based IDPS: monitors individual devices internals and files.
-Network-Based IDPS: monitors network by looking for patterns.
-Signature-Based IDPS: matches traffic with predetermined signatures.
-Anomaly-Based IDPS: looks for abnormal activity.
2 ways to secure bluetooth devices:
-Turn bluetooth off when unused.
-Do not accept unknown pairing requests.
What are 3 Scanning and analysis tools?
-Port Scanners: a group of software that can detect active computer ports.
-Vulnerability Scanners: can scan networks for very detailed information.
-Packet Sniffers: collects and analyzes packets.
What is “Fingerprinting”?
An examination of the organizations network addresses.