Domain 4 Flashcards
Control traffic flow on networks and connect similar networks
Router
Filter traffic based on a defined set of rules. Also called ACLs
Firewall
Computer that provides info to other computers on a network
Server
End of network communication link. A client makes a request to use a network resource.
Endpoint
Represent network interface within the network and maintain communications when physical device when swapped with new hardware.
IP Address
What is the Upper Layer of the OSI Model?
Layers 5-7 (SPA)
What is the Lower Layer of the OSI Model?
Layers 1-4
Framework for how protocols should function. Common reference to understand components of software interfaces to physical hardware
OSI Model
Adds information to a packet as it travels to its destination
Encapsulation
Referencing image file like JPEG or PNG
Presentation Layer 6
Logical ports like NetBIOS
Session Layer 5
Discussing TCP/UDP
Transport Layer 4
Discussing Routers that are sending packets
Network Layer 3
Discussing switches, bridges or WAPs sending frames
Data Link Layer 2
Data moves up the OSI model layers from physical to application
De-Encapsulation
How data moves through the network
Network Interface Layer (TCP/IP Layers)
Creates/Inserts packets
Internet Layer (TCP/IP Layers)
Permits data to move among devices
Transport Layer (TCP/IP Layers)
Defines the protocols for the transport layer
Application Layer (TCP/IP Layers)
Determine health of a network or specific link. By ping, traceroute and other network management tools.
Internet Control Message Protocol (ICMP)
10.0.0.0 to 10.255.255.254
172.16.0.0 to 172.31.255.254
192.168.0.0 to 192.168.255.254
Private Addresses
Ensure integrity and confidentiality of IP packets and allow communicating partners to authenticate each other
IPsec
Help services obtain an appropriate share of a network’s bandwidth.
QoS
Security event or multiple events where an intruder gains, attempts or access a system without authorization
Intrusion
Event that actually/potentially jeopardize the CIA of an information system, which is processed, stored or transmitted
Incident
Action that takes advantage of a flaw in a computer system or software. System vulnerabilities
Exploit
Loss of control, compromise, unauthorized disclosure where a person non authorized accesses PII, other than an authorized purpose.
Breach
Process of preparing, detecting, analyzing, containing, eradicating and recovering from a security incident
Incident Response
Train staff, implement incident response team, identify roles & responsibilities and identify critical data, systems and any single points of failure
Incident Response Preparation
Monitor all possible attack vectors, prioritize incident response and incident documentation
Incident Response Detection & Analysis
Gather evidence, appropriate containment strategy, identify and isolate the attack
Incident Response Containment, Eradication and Recovery
Senior management, info security professionals, public affairs and engineering representatives
Incident Response Team Members
Act of developing plans and procedures for maintaining business operations in event of a disaster or security incident
Business Continuity
Process to evaluate potential effects of threats that interrupt critical business functions for the purpose of determining recovery plans
Business Impact Analysis
A set of standardized rules that allow computers to communicate on a network such as the internet.
TCP/IP
Network Communications using the NetBIOS protocol
Ports 137, 138, and 139 (NetBIOS)
A malicious attempt to disrupt the normal traffic of a targeted server, service or network by overwhelming the target or its surrounding infrastructure with a flood of Internet traffic
DDoS
Spreads after a user takes some type of user action
Virus
Measure encryption footprints. Attackers use footprints monitor system activity and to retrieve information that is actively being encrypted.
Side Channel Attacks
Monitors the computer infrastructure on which it is installed, analyzing traffic and logging malicious behavior.
Host-Based IDS (HIDS)
Detects malicious traffic on a network.
Network-Based IDS (NIDS)