Chapter 3/4 Flashcards
Hardware device that can get on wired or wireless connection
Endpoint
Collection of software tools to control and secure endpoints from single console
Unified endpoint management (UEM)
Set of tech to protect endpoint against various attacks
Endpoint protection/security
Combines endpoint monitoring and log analysis for network events to detect and respond to incidents at endpoint
EDR & ETDR (Endpoint and threat detection and response)
Firewall that combines packet filtering firewall with other tech to detect and block network attack
Next gen firewall
Tech and process used to prevent accidental or intentional actions to of sensitive organizational data
Data loss prevention (DLP)
Firewall that runs on host and controls host inbound and outbound network traffic
Host based firewall
Program that runs on a host and can detect a threat
Host based intrusion detection system (HIDS)
Program that runs on host and can detect and prevent threats
Host based intrusion prevention system (HIPS)
Method to secure drive data with encryption
Full disk encryption (FDE)
A HDD or SSD with encryption circuitry built into drive
Self encrypting drive (SED)
Hierarchical database that stores configuration settings in Windows OS
Registry
Port number between 0 and 1,023
Well known port
Port number between 1,024 and 49,151
Registered port
Port number between 49,152 and 65,535
High number port (private/dynamic port)