Brainscape
Find Flashcards
Make Flashcards
Why It Works
More
Educators
Businesses
Tutors & resellers
Content partnerships
Academy
About
Educators
Teachers & professors
Content partnerships
Tutors & resellers
Businesses
Employee training
Content partnerships
Tutors & resellers
Academy
About
Log In
Get Started
Brainscape's Knowledge Genome
TM
Browse over 1 million classes created by top students, professors, publishers, and experts.
Entrance Exams
Professional Certifications
Foreign Languages
Medical & Nursing
Science
English
Humanities & Social Studies
Mathematics
Law
Vocations
Health & Fitness
Business & Finance
Technology & Engineering
Food & Beverage
Fine Arts
Random Knowledge
See full index
Cyber Security 601
> Proxy Servers > Flashcards
Proxy Servers Flashcards
Study These Flashcards
Cyber Security 601
(118 decks)
Encryption Overview
IPSec & TLS/SSL
Securing Storage Devices
Endpoint Analysis
Securing Wireless Devices
SIM Cloning, ID Theft, & Bluetooth Attacks
Root of Trust
Trusted Firmware
Secure Processing
Mobile Device Theft
Security of Mobile Apps
Bring Your Own Device
Hardening Mobile Devices
Hardening
Trusted Operating System
Group Policies
File Systems & Hard Drives
Supply Chain Assessment
Root of Trust Supply Chain
Hypervisors
Threats to VM's
Securing VM's
Web Browser Security
Web Browser Concerns
Securing Applications
Software Development
SDLC Principles (Software Development Life Cycle)
Testing Methods (Software)
Vulnerabilities & Exploits
Buffer Overflows
Cross Site Scripting & Cross Site Request Forgery
SQL Injection
XML Vulnerabilities
Race Conditions
Design Vulnerabilities
The OSI Model
Switches
Routers
Network Zones
Jumpbox
Network Access Control
VLAN's
Subnetting
Network Address Translation
Firewalls
Proxy Servers
Authentication Summary
Access Control Models
Best Practices for Access Control
Users and Groups
Permissions
Risk Assesment
Qualitative and Quantitative Risk
Methodologies and Security Controls
Types of Risk
Vulnerability Management
Penetration Testing
Training and Exercises
OVAL
Vulnerability Assessment Tools
Password Analysis Tools
Performance Baselining
Protocol Analyzers
Simple Network Management Protocol (SNMP)
Auditing
Logging
Log Files
Security Information and Event Management Systems (SIEM)
SYSLOG
Security Orchestration Automation and Response
Symmetric Algorithms
Asymmetric Algorithms
Pretty Good Privacy
One-Time Pad
Cryptography Considerations
Hashing
Hashing Attacks
Public Key Infrastructure
Digital Certificates
Certificate Authorities
Secure/Multipurpose Internet Mail Extensions (S/MIME)
More on SSL and TLS
Secure Shell (SSH)
VPN Protocols
Planning for the Worst
Redundant Power
Backup Power
Data Redundancy / Disk Redundancy
Network Redundancy
Server Redundancy
Redundant Sites
Data Backup
Tape Rotation
Disaster Recovery Plan
Business Impact Analysis
Policies and Procedures
Data Classifications
Data Ownership
PII and PHI
Legal Requirements
Privacy Technologies
Security Policies
Vendor Relationships
Disposal Policies
IT Security Framework
Incident Response Procedures
Incident Response Planning
Investigative Data
Forensic Procedures
Data Collection Procedures
Security Tools Part 1 (Network Tools)
Security Tools Part 2 (Network Tools)
Security Tools Part 3 (File Manipulation)
Security Tools Part 4 (Shells and Scripts)
Security Tools Part 5 (Packet Capture)
Security Tools Part 6 (Forensics)
Security Tools Part 7 (Exploitation)
Ports & Protocols