Network And Application Security Week 6/7 Flashcards
Active directory
A windows component that stores network, domain, and user data. Allows administrators manage permissions and limit network access.
Active directory domain services
Authenticates users and defines which network resources they can access.
Anonymity
A condition in which users conceal their online id without masking their activity.
Asymmetric cryptography (public key cryptography
A cryptographic algorithm that requires two separate keys. One private and the other public. Message is encrypted with the public key and decrypted with the private key.
Authorization
The process that determines whether an id person is allowed access to a resource.
Behavior based detection
A type of threat detection that monitors unusual behavior. Ex a large number of requests for a computer or device resource.
Blacklisting
The practice of allowing anything to enter a network unless expressly prohibited.
Cloud DLP
A type of data loss prevention that encrypts cloud acct.
Correlation rule
A rule that instructs a sec mechanism as to which sequence of events may indicate anomalies, security vulnerabilities, or a cyber-attack
Data Loss Prevention (DLP)
A security tool that helps ensure users don’t transfer Valuable or sensitive data outside of the organization by monitoring, identifying, and blocking unwanted transfers.
Demilitarized Zone(DMZ)
A subnetwork located between private networks and the public internet which contains services that are fully exposed to the internet. This adds an extra layer of security preventing unnecessary access to private networks.
Domain controllers DC
A server that handles and responds to authentication requests inside a windows server domain.
Discretionary Access Control
Type is access control that restricts access to resources based on subject’s identity or group membership.
Endpoint agent
An EDR agent that monitors and collects data on all endpoint activities and stores it in a centralized database.
Endpoint Detection and Response (EDR)
A security tool that combines monitoring, protection and response to security threats on endpoints in real time.
Endpoint DLP
A type of DLP that doesn’t require a network. It monitors servers, workstations, laptops, and mobile devices that use, transfer, or store critical data. It can also monitor unsecure data storage.
Hashing
A process performed on data such as a file or application to generate a hash value.
Honeypot
A security mechanism that sets up a virtual trap to attract attackers. They are a form of misdirection that enables analysts to study the attackers activity patterns.
Host based firewall
A firewall that runs on a single networked computer or device. This type of firewall protect individual hosts from malware and attacks and control their network spread.
Host based intrusion detection system (HIDS)
A mechanism that runs on each host or endpoint device in a network and checks incoming and outgoing host packets and alerts endpoint users when it detects abnormalities.