Supporting And Troubleshooting Secure Networks Flashcards
Enforcing a security zone by separating a segment of the network from access by the rest of the network. This could be accomplished using firewalls or VPNs or VLANs. A physically separate network or host (with no cabling or wireless links to other networks) is referred to as air-gapped. Also referred to as Network Separation
Network Segmentation Enforcement
Segment isolated from the rest of a private network by one or more fire alls that accepts connections from the Internet over designated ports.
Screened subnet
Software or hardware device that protects a system or net park by blocking unwanted network traffic.
Firewall
Server that mediates the communications between a client and another server. It can filter and often modify communications as well as provide caching services to improve performance.
Proxy server
Routing mechanism that conceals internal addressing schemes from the public Internet by translating between a single public address on the external side of a router and private, non-reputable addresses internally.
Network Address Translation (NAT)
Maps private host IP addresses onto a single public IP address. Each host is tracked by assigning it a random high TCP port for communications.
Port Address Translation (PAT)
Security strategy that positions the layers of network security as network traffic roadblocks; each layer is intended to slow an attacks progress rather than eliminating it outright.
Defense in depth
General term for the collected protocols policies and hardware that authenticate and authorize access to a network at the device level.
Network Access Control (NAC)
Host, network or file set up with the purpose of luring attackers away from assets of actual value and/or discovering attack strategies and weaknesses in the security configuration
Honeypot
Security policy concept that states that duties and responsibilities should be divided among individuals to prevent ethical conflicts or abuse of powers
Separation of duties
Security appliance or software that uses passive hardware sensors to monitor traffic on a specific segment of the network.
Intrusion detection system (IDS)
Security appliance or software that combines detection capabilities with functions that can actively block attacks.
Intrusion prevention system (IPS)
Security framework and tools to facilitate use of personally winded devices to access corporate networks and data
Bring your on device (BYOD)