Monitoring and Diagnosing Networks Flashcards
demilitarized zone (DMZ)
A network segment between two firewalls. Allows separation of public and private information on a network
DMZ
demilitarized zone
Honeypot
A fake system designed to divert attackers from your real system. Often has much more monitoring and logging to gather information on possible threats
Honeynet
A network that functions the same as a honeypot
Information security management system (ISMS)
A broad term that applies to a wide range of systems used to manage information security
ISMS
information security management systems
Intrusion detection system (IDS)
A system that monitors the network for possible intrusions and logs that activity
IDS
intrusion detection system
Intrusion prevention system (IPS)
A system that monitors the network for possible intrusions and logs that activity, then blocks the suspicious traffic
IPS
intrusion prevention system
Personally identifiable information (PII)
Any information that could identify a particular individual
PII
personally identifiable information
Software-defined network (SDN)
The entire network, including all security devices, is virtualized
SDN
software-defined network
Stateful packet inspection (SPI)
A firewall that examines each packet and remembers the recent previous packets
SPI
stateful packet inspection
ISO
International Organization for Standardization
NERC
North American Electric Reliability Corporation
NIST
National Institute of Standards and Technology
Six phases of the IT security life cycle, according to NIST
- Initiation
- Assessment
- Solution
- Implementation
- Operations
- Closeout
ISA/IEC-62443
Series of standards that define procedures for implementing electronically secure industrial automation and control systems (IACSs)
IACSs
industrial automation and control systems
Payment Card Industry Data Security Standard (PCI-DSS)
Security standards used by Visa, Mastercard, American Express, and Discover
PCI-DSS
payment card industry data security standard
Three types of zones
- Secure zone
- General work zone
- Low security zone
The three choices of wireless protection protocol (list from least secure to most secure)
WEP, WPA, WPA2
Defense in depth
Security should be extended throughout the network, not just the perimeter; utilizes network segmentation
Virtual local area network (VLAN)
A set of ports on a switch are configured to behave like a separate network
VLAN
virtual local area network
air-gap
When one or more systems are literally not connected to a network