Lesson 9-12 Flashcards
physical security is largely concerned with protecting these categories (3)
people, data, equipment
data storage virtualization tech that combines multiple physical disk drive components into a single logical unit for redundancy, performance improvement, or both
RAID (Redundant Arrays of Inexpensive/Inline Disks)
firewall that looks at the contents of each packet and makes a decision based on the source and destination IP
packet filtering
firewall that uses a state table to track traffic and only allow a response to an existing request
stateful firewall
firewall that analyzes contents of traffic flowing through them
deep packet inspection
serve as choke points to filter traffic for attacks or undesirable content
proxy servers
combination of a network design feature and a protective device (like a firewall)
DMZ (demilitarized zone)
occur when we do not properly account for data being taken into an application
buffer overflows
occur when multiple threads/processes share access to a resource
race conditions
attack carried out by placing code in a scripting language into a web page, an unsuspecting user triggers the script when they visit the page
cross site scripting