Test Review Flashcards
Stateful Inspection
Compares certain key parts of the packet to a database of trusted information
Packet Filtering or Packet Purity
Analyzed against a set of filters. That make it through the filters are sent to the requesting system and others are discarded
IP Addresses
Blocks certain Ip addresses or a range of IP addresses
Protocols
Decides which if the systems can allow or have access
Ports
Blocking or disabling ports of severs that are connected. Maintain the kind of data flow you want to see and close down possible entry points for hackers.
Keywords
Will block any website that has to deal with certain predetermined keywords
IP
Internet Protocol. The main delivery system for information over the Internet
TCP
A protocol developed for the internet to get data from one network device to another
HTTP
Hyper Text Transfer Protocol
FTP
Files Transfer Protocol. Used to upload or download files
UDP
User Datagram Protocol. Used for information that requires no response. For example streaming audio or video
ICMP
Internet Control Message Protocol. Used by a router to exchange information with other routers
SMTP
Simple Mail Transport Protocol. Used to send text based information, email
SNMP
Simple Network Management Protocol. Used to collect system information from a remote computer
Telnet
Used to preform commands on a remote computer
Remote Login
When someone connects to a computer via the Internet
Application Backdoor
Hidden access that provides some level of control of the program
SMTP Session Hijacking
By gaining access to a list of email addresses a person can send spam to thousands of users
Operating Systems Bugs
Operating systems backdoors
E-mail bombs
Large quantity of bulk e-mail that overwhelms and e-mail server preventing user access
Macros
Tools that allow a user to program repetitive tasks into the computers memory so that they can be quickly accomplished with the touch of a couple keys that the user has selected
Spam
Unwanted e-mail(usually of a commercial nature sent out in bulk)
Redirect Bombs
Hackers can use ICMP to change the path information take by sending it a different router
Source Routing
Technique in which the originator of a packet can attempt to partially or completely control the path through the network to the destination.
Proxy Server
A server that all computers on the local network have to go through before accessing information on the Internet
Adware
Any software application that displays advertising banners while the program’s running. Authors may include additional code, which can be viewed thru pop-up windows or a bar that appears on the computer screen. Usually includes code that tracks a user’s personal info & passes it on to 3rd parties, without the user’s authorization or knowledge
Alert
Notification that a specific attack had been directed at the information system of an organization.
Attack
Intentional act of attempting to bypass one or more computer security controls.
Audit Trial
A record showing who has accessed a computer system and what operations he or she has performed during a given period of time. Useful both for maintaining security and for recovering lost translocation a
Authenticate
To verify the identity of a user, user device, or other entity, or the integrity of data storage, transmitted, or otherwise exposed to unauthorized modification in an information system, or to establish the validity of a transition.
Authentication
Security measures designed to establish the validity of a transmission, message, or originator, or a means of verifying on individual’s authorization to receive specific categories of information
Back Door
Hidden software or hardware mechanism used to circumvent security controls
Back up
A copy of data and or applications contained in the IT store on a magnetic media outside of the IT to be used in the event of IT data loss
Blended Threat
A computer network attack that seeks to maximize the severity of damage and speed of contagion by combining methods, for example using characteristics of both viruses and worms, while also taking advantage of vulnerabilities and computers, networks, or other physical system. In attack using a blended approach might send the virus via an email attachment, along with a Trojan horse amended any HTML file that will cause damage to the recipient computer.
Bots
Remote-control Asians installed on your computer often controlled remotely via Internet relay chat once the system is infected, it becomes part of a network and is used in conjunction with other respective members to carry out the wishes of the owner or herder. These games and networks for vulnerabilities, installed various distributed denial of services tools, capture network packets, or download an executive arbitrary program. Computers or systems infected can be used to distribute spam to make a harder track and prosecute the spammers
Broadband
The general term used to refer to high-speed network connections typically for connections in excess of 1 Megabit Per second to be so name
Browser/ browser settings
Configuration strategy to Manage The risk associated with active content while still enabling trusted sites
Certification
The comprehensive evaluation of the technical and non-technical security features of an IT and other safeguards, made in support of the accreditation process, that establishes the extent to which a particular design and implementation met a specified set of security requirement
Cipher text
For cryptography and which the plain text is made unintelligible to anyone, who interprets it by a transformation of the information itself, based on some key
Configuration management
The process of keeping track of changes to the system, if needed, improving, approving them.