Network Security 4.1 Flashcards
A perimeter network that protects an organization’s internal local area network from untrusted traffic
DMZ
Subnet in the network architecture that uses a single firewall with three interfaces to connect three dissimilar networks
Screen Subnet
Prevents frauds and abuse by distributing various tasks and approval authorities across a number of different users
Separation of Duties
Two people each have half of the knowledge of how to do something
Split Knowledge
Attracts and traps potential attackers to counteract any attempts at unauthorized access to a network. Used a form of research to learn the tools involved in network attacks
Honeypot/Honeynet
Using the lowest level of permissions of privileges needed in order to complete a job function or admin task
Least Privilege
An access control model that is controlled by the system but focuses on a set of permissions versus an individual’s permissions
Role-Based Access (RBAC)
An access control method where access is determined by the owner of the resource
Directionary Access Control (DAC)
An access control policy where the computer system gets to decide who gets access to what objects. Used in the government for security clearance.
Mandatory Access Control (MAC)
A security framework that requires users to be authenticated and authorized before being granted access to applications and data
Zero-Trust
Authenticates or proves an identity using more than one method
Multifactor Authentication
Tries every possible combination until they figure out the password
Brute Force Attack
Combination of dictionary and brute force attacks
Hybrid Attack
The process of determining whether someone or something is who or what it claims itself to be
Authentication Methods
A database used to centralize information about your clients and your objects on your network
Lightweight Directory Access Protocol (LDAP) – Port 389