Security Applications and Devices Flashcards
Personal Firewalls
§ Software application that protects a single computer from unwanted Internet traffic § Host-based firewalls § Windows Firewall (Windows) § PF and IPFW (OS X) § iptables (Linux)
IDS
Intrusion Detection System
Device or software application that monitors a system or network and analyzes the data passing through it in order to identify an incident or attack
HIDS
Host-based IDS
NIDS
Network-based IDS
Intrusion Detection Methods
Signature-based
Policy-based
Anomaly-based
Loss Prevention (DLP)
Monitors the data of a system while in use, in transit, or at rest to detect attempts to steal the data
Endpoint DLP System
Software-based client that monitors the data in use on a computer and can stop a file transfer or alert an admin of the occurrence
Network DLP System
Software or hardware-based solution that is installed on the perimeter of the network to detect data in transit
Storage DLP System
Software installed on servers in the datacenter to inspect the data at rest
Cloud DLP System
Cloud software as a service that protects data being stored in cloud services
Trusted Platform Module (TPM)
Chip residing on the motherboard that contains an encryption key
Endpoint analysis
Anti-virus (AV) Host-based IDS/IPS (HIDS/HIPS) Endpoint Protection Platform (EPP) Endpoint Detection and Response (EDR) User and Entity Behavior Analytics (UEBA)
Bluetooth Attacks
Bluejacking
Bluesnarfing
Bluejacking
Sending of unsolicited messages to Bluetooth-enabled devices
Bluesnarfing
Unauthorized access of information from a wireless device over a Bluetooth connection