Network Risk Management Flashcards
the list of statements on a router to permit/deny traffic
ACL (access control list)
a myriad of small, simple requests that all result in giant responses
amplification attack
the filter takes applications into consideration
application aware
gives the firewall application awareness
Application Control
software security flaws
backdoor
a group of computers in coordinated DDoS attacks without knowledge
botnet
a document to make employees aware that their computer and equipment use will be monitored
consent to monitoring
A system becomes inundated with service requests and ceases to respond
Denial of Service attack
software on a device that allows it to access the network, subsequently uninstalls
dissolvable agent
multiple hosts inundate a target with traffic
Distributed attakc
a DoS attack bounced off of uninfected computers (reflectors) before arriving at the target.
Distributed reflector attack
A switch security feature to monitor ARP messages and detect phony ones
Dynamic ARP inspection
Implementation of TEMPEST to protect against RF emanation
emission security
causing the target’s computer screen to fill with garbage
flashing
An FTP client specifies a different host’s IP address and port number for data destination.
FTP bounce