Securing a Network Flashcards
What is the device/application that controls the flow of traffic by preventing unauthorized network traffic from entering or leaving a particular segment of a network called?
Firewall
What type of firewall compares received traffic with a set of rules that define which traffic it will permit to pass through the firewall, and has no memory of packets it has encountered in the past?
Packet filtering firewall
What type of firewall remembers information about the status of a network communication, once the firewall receives the first packet in a communication, the firewall remembers that communication session until it is closed, only needs to check rules when a new communication session starts?
Stateful inspection firewall
What type of firewall inspects the contents of packets, specifically designed to monitor and control traffic based on the applications or services generating data, can enforce more granular policies by inspecting application-specific commands or data payloads?
Application layer firewall
What type of firewall does not allow packets to travel directly between systems on opposite sides of the firewall. It opens separate connections with each of the communicating systems and then acts as a broker (or proxy) between the two, which allows for an added degree of protection b/c the firewall can analyze info about the application in use when making the decision to allow or deny traffic?
Proxy firewall
What security measure passively listens and monitors the network, alerting the admin of any detected suspicious behavior, available as virtual and host-based application that can be configured to operate in tap mode, identifying malicious traffic when detected?
Intrusion Detection System (IDS)
What security measure has cables physically routed through devices to create choke points blocking threats when they are intercepted, available as virtual and host-based application that can be configured to operate in tap mode, identifying and blocking malicious traffic when detected?
Intrusion Prevention System (IPS)
What scrambles data and has two ways to do it?
Encryption
What are the two encryption types?
Symmetric and Asymmetric
Which type of encryption is the strongest, widely used, fast, and the key that encrypts also decrypts?
Symmetric
Which type of encryption is slower, can’t encrypt large amounts of data, has a public and private key, and when you use one key to encrypt you can only decrypt with the other key?
Asymmetric
What is encrypted plaintext called?
Ciphertext
What is the process by which we secure and lock down our software, systems, individual applications, or the entire organization?
Hardening
What security measure uses several defensive security controls to protect the data, applications, and network and designed to slow down the attack?
Defense in depth
What is a short written statement that the people in charge of an organization have set as a course of action or direction, comes from upper management, and applies to the entire organization?
Policy