Cisco Intro Cybersecurity Ch.4 Flashcards
port scanning
the process of probing a computer, server, or other network host for open ports
firewall
protects the network by controlling what traffic is allowed in, as well as allowed out
DDoS
This attack disrupts services by simply overwhelming servers and network devices with bogus traffic.
physical security
a type of security measure that restricts access to networking closets, server locations, as well as fire suppression
botnet
botnet can have tens of thousands of bots, or even hundreds of thousands.
Kill Chain
a conceptual outline of the stages of an information systems attack
IPS/IDS
a security appliance that has the ability to block or deny traffic based on a positive rule or a signature match
NetFlow
a tool used to gather information about data flowing through a network
IPS
Dedicated to intrusion prevention
AMP
Comes in next generation devices and can also be installed as software in host computers
VPN
Designed for secure encrypted tunneling
Router
Has many capabilities besides just routing functions, including traffic filtering, encryption, and capabilities for secure encrypted tunneling
Firewall
Has all the capabilities of an ISR as well as advanced network management and analytics
Kill Chain Stage 1
Reconnaissance
Kill Chain Stage 2
Weaponization