Network Risk Management Flashcards
the list of statements on a router to permit/deny traffic
ACL (access control list)
a myriad of small, simple requests that all result in giant responses
amplification attack
the filter takes applications into consideration
application aware
gives the firewall application awareness
Application Control
software security flaws
backdoor
a group of computers in coordinated DDoS attacks without knowledge
botnet
a document to make employees aware that their computer and equipment use will be monitored
consent to monitoring
A system becomes inundated with service requests and ceases to respond
Denial of Service attack
software on a device that allows it to access the network, subsequently uninstalls
dissolvable agent
multiple hosts inundate a target with traffic
Distributed attakc
a DoS attack bounced off of uninfected computers (reflectors) before arriving at the target.
Distributed reflector attack
A switch security feature to monitor ARP messages and detect phony ones
Dynamic ARP inspection
Implementation of TEMPEST to protect against RF emanation
emission security
causing the target’s computer screen to fill with garbage
flashing
An FTP client specifies a different host’s IP address and port number for data destination.
FTP bounce
scanning for malware-like behavior
heuristic scanning
runs on a single computer, alerts about intrusions
HIDS (host-based intrusion detection system)
runs on a single computer, intercepts intrusions
HIPS (host-based intrusion prevention system)
dedicated service to monitor traffic and alert
IDS (intrusion detection system)
dedicated service to prevent malicious traffic
IPS (intrusion prevention system)
a virus in a macro that executes when a program is in use
macro virus
a person captures or redirects secure data while in transit
man-in-the-middle attack
combines known scanning techniques and exploits to explore potential exploits
metasploit
employs network policies to determine a device’s access permissions.
NAC (network access control)
some parts of the network have been physically separated in order to protect resources
network segementation
A DoS attack rendering a device irreparable
permanent DoS attack
a port on a switch that sends a copy of all traffic to a second port
port mirroring
the assessment of an organization’s security vulnerabilities
posture assessment
a section of the network that a device joins when its configurations do not meet compliance requirements
quarantine network
a host that provides services to internet clients from servers on its own network
reverse proxy
network hosts are flooded with broadcast messages
smurf attack
a firewall that inspects packets to determine if they originate from an active connection
stateful firewall
a firewall that inspects packets on a stand-alone basis
stateless firewall
An NSA standard to protect against RF emanations
TEMPEST
a software vulnerability for a program that has not yet become public.
zero-day attack