Information Security 3 Flashcards

1
Q

wall or partition that is designed to prevent fire from spreading from one part of a building to another.

A

firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Firewall Types

A
  1. Network Layer Firewall
  2. Transport Layer Firewall
  3. Application Layer Firewall
  4. Context Aware Application Firewall
  5. Proxy Server
  6. Reverse Proxy Server
  7. Network Address Translation (NAT) Firewall
  8. Host-based Firewall
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

filtering based on source and destination IP addresses

A

Network Layer Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

filtering based on source and destination data ports, and filtering based on connection states

A

Transport Layer Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

filtering based on application, program or service

A

Application Layer Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

iltering based on the user, device, role, application type, and threat profile

A

Context Aware Application Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

filtering of web content requests like URL, domain, media, etc.

A

Proxy Server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

placed in front of web servers, reverse proxy servers protect, hide, offload, and distribute access to web servers

A

Reverse Proxy Server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

hides or masquerades the private addresses of network hosts

A

Network Address Translation (NAT) Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

filtering of ports and system service calls on a single computer operating system

A

Host-based Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

designed to control, or filter, which communications are allowed in and which are allowed out of a device or network, as shown in the figu

A

firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

process of probing a computer, server or other network host for open ports. In networking, each application running on a device is assigned an identifier called a port number.

A

Port Scanning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The host replied indicating a service is listening on the port.

A

Open or Accepted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The host replied indicating that connections will be denied to the port.

A

Closed, Denied, or Not Listening

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

There was no reply from the host.

A

Filtered, Dropped, or Blocked

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

8 types of firewalls based on general structure and method

A
  1. packet-filtering firewall
  2. circuit-level gateway
  3. stateful inspection firewall
  4. application-level firewall
  5. next-gen firewall
  6. software firewall
  7. hardware firewall
  8. cloud firewall
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q
  • oldest firewall
  • designed to create checkpoints at individual routers or switches
A

packet-filtering firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q
  • quickyly and easily approve or deny traffic
  • verifying transmission control protocol handshake
A

circuit-level gateway

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q
  • combination of packet-filtering and circuit-level gateway
  • offer higher level of protection of your business
A

stateful inspection firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q
  • firewalls operate at application layer to filter traffic
  • cloud-based most of the time and establish traffic connections and examine data packets coming
A

proxy firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

time it was created into what makes it this kind of firewall

A

next generation firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

firewalls installed on local devices

A

software firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

firewalls used on physical devices and act as traffic router

A

hardware firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q
  • also called as FaaS
  • often go hand in hand i=with proxy firewalls and they grow with business
A

cloud firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

can be stand-alone devices, like a router or firewall, a card that can be installed into a network device, or a module with its own processor and cached memory

A

Security Appliances

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

have many firewall capabilities besides just routing functions, including traffic filtering, the ability to run an Intrusion Prevention System (IPS), encryption, and VPN capabilities for secure encrypted tunneling.

A

Routers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Cisco Next Generation Firewalls have all the capabilities of an ISR router, as well as, advanced network management and analytics. Cisco Adaptive Security Appliance (ASA) with firewall capabilities are shown in Figure 2.

A

Firewalls

28
Q

are dedicated to intrusion prevention.

A

IPS

29
Q

server and client technologies. It is designed for secure encrypted tunneling.

A

Virtual Private Network (VPN)

30
Q

comes in next generation Cisco routers, firewalls, IPS devices, Web and Email Security Appliances and can also be installed as software in host computers.

A

Malware/Antivirus

31
Q

This category includes web and email security appliances, decryption devices, client access control servers, and security management systems.

A

Other Security Devices

32
Q

which firewall is best for business needs

A

cloud and hardware firewalls

33
Q

Detecting attacks in real time requires actively scanning for attacks using firewall and IDS/IPS network devices

A

Real Time Scanning from Edge to Endpoint

34
Q
  • DDoS is one of the biggest attack threats requiring real-time response and detection.
  • DDoS attacks are extremely difficult to defend against because the attacks originate from hundreds, or thousands of zombie hosts, and the attacks appear as legitimate traffic, as shown in the figure.
A

DDoS Attacks and Real Time Response

35
Q
  • security technique that regulates who or what can view or use resourcesin a computing environment
  • fundamental concept in security that minimizes risk to the business organization
  • perform identification authentication and authorization of users and entities by evaluating login credentials
A

access control

36
Q

two types of access control

A
  1. physical access
  2. logical access
37
Q

type of access that controls limit access to campuses, buildings, rooms and physical IT assets

A

physical access

38
Q

type of access control that limits connections to computer networks, system files and data

A

logical data

39
Q

why is access control important?

A
  1. minimiza security risk
  2. ensures security technology and access control are in place to protect customer data
  3. complex and can be challenging to manage
  4. on-premises and cloud environments
40
Q

models of access controls

A
  1. mandatory access control
  2. discretionary access control
  3. role-based access control
  4. rule-based access control
  5. attribute-based access control
41
Q

security model in which access rights are regulated by central authority based on multiple levels of security

A

mandatory access control

42
Q

access control method which owners or admins set policies defining who or what is authorized to access the resource

A

discretionary access control

43
Q

This is a widely used access control mechanism that restricts access to computer resources based on individuals or groups with defined business functions

A

Role-based access control (RBAC)

44
Q

This is a security model in which the system administrator defines the rules that govern access to resource objects

A

Rule-based access control.

45
Q

This is a methodology that manages access
rights by evaluating a set of rules, policies and relationships using the attributes of
users, systems and environmental condition

A

Attribute-based access control (ABAC)

46
Q

Challenges of access control

A
  • dynamically managing distributed IT environments;
  • password fatigue;
  • compliance visibility through consistent reporting;
  • centralizing user directories and avoiding application-specific silos; and
  • data governance and visibility through consistent reporting.
47
Q
  • use of a program to screen and/or exclude access to web pages or email deemed objectionable
  • also used to implement company policies related to information system
    usage.
A

Content Filtering

48
Q

types of content filtering

A
  1. web filter
  2. email filter
  3. internet filter
  4. search engine filter
  5. proxy content filtering
  6. dns based content filtering
49
Q

Top 10 Content Filtering Software
Solutions

A
  1. AT&T Global Security Gateway
  2. Barracuda Web Security Gateway
  3. Cisco Umbrella
  4. Comodo Cybersecurity
  5. DNSFilter
  6. Flashstart
  7. FortiGuard
  8. Smoothwall SWG
  9. WebRoot
  10. WebTitan
50
Q

Why is Content Filtering Important?

A

helps to mitigate these risks by making such content difficult to access in the workplace, and by demonstrating the company’s intolerance for inappropriate, illegal, or objectionable content in general.

51
Q

n encrypted connection over the Internet from a device to a network. The encrypted connection helps ensure that sensitive data is safely transmitted

A

Virtual Private Network

52
Q

To be effective, content filtering has to be deployed across all content channels. The most common channels include

A
  1. web
  2. emails
  3. executables
53
Q
  • provides a safe, secure way to connect users and devices
  • remotely to a corporate network. It includes VPN technology that uses strong ways to authenticate the user or device
A

Secure remote access

54
Q

Types of VPNs

A
  1. remote access
  2. site-to-site
55
Q

VPN securely connects a device outside the corporate office

A

Remote access

56
Q

connects the corporate office to branch offices over the Internet

A

Site-to-site

57
Q

Setting up a VPN on Windows 10

A
  1. Type “VPN” into the search box in your
    taskbar, then open your VPN Settings
  2. Add a VPN connection
  3. Here, you’ll enter all the information about
    your VPN
  4. click the icon that corresponds
    to your internet connection
58
Q

seven new emerging technology clusters to have significatnt impact on cybercrime

A
  1. AI
  2. Autonomous Drive and Systems
  3. Computing and Data Storage Technologies
  4. Telecommunication Infrastructure
  5. Internet of Things (IoT)
  6. Privacy-Enhancing Technologies
  7. Blokchain and Distributed Ledger Technologies
59
Q

could increase autimation, speed, frequency and efficiency of attacks as well as potential for tailored attacks targeting specific groups

A

AI/ML

60
Q

could be used to carry out disguised criminal acts, develop new operation methods for criminals or canduct large-scale automated attacks

A

autonomous device and systems

61
Q

development and increasing use of computing and data storage technologies could be exploited by criminals to gain access and disseminated non-consensual recordings

A

computing data and storage tech

62
Q

can be used to enhance anonymity, speed aand capacity of criminal activities

A

telecommunication infrastructure

63
Q

growing volumes of data gathered by IOT could become vulnerable to theft, corruption, extortion

A

IoT

64
Q

could be exploited by malicious actors to pursure illicit activities anonymously and secretly making it difficult to detect criminal
activity

A

Privacy Enhancing Technologies (PETS)

65
Q

transactions become digitalized and processed, these could be manipulated for malicious purposes such as preventing transactions from being processed

A

blockchain and distributed ledger technologies