Udemy Sections 4-6: Security Applications and Devices, Mobile Device Security, and Hardening Flashcards
Software application that protects a single computer or server from unwanted internet traffic
Personal firewall
AKA host-based firewall
Which firewall is used with Windows?
Windows Firewall
What do you need to type in the Start bar to find the Windows Firewall with Advanced Security?
wf.msc
Which firewall is used with Mac?
PF (Packet Filter)
IPFW (Internet Protocol Firewall) is the older version that is no longer used
Which firewall is used with Linux?
iptables
T/F: Most antimalware software includes its own firewall
True
T/F: Most small/home office routers and access points have their own hardware firewall included
True
What does Stealth Mode in Apple’s GUI firewall mean?
Your computer will not respond to or acknowledge any attempt to ping (or otherwise test an application by using ICMP)
Device or software application that monitors a system or network and analyzes the data passing through it in order to identify an incident or attack
IDS (Intrusion Detection System)
3 types of detection methods that NIDS and HIDS use
Signature-based
Policy-based
Anomaly-based
A type of IDS detection method where a specific string of bytes triggers an alert
Signature-based detection method
A type of IDS detection method that relies on specific declaration of the security policy (i.e., “No Telnet Authorized”)
Policy-based detection method
A type of IDS detection method that analyzes the current traffic against an established baseline and triggers an alert if outside the statistical average
Anomaly-based detection method
AKA statistical-based detection method
4 types of IDS alerts
True positive
True negative
False positive
False negative
T/F: IDSs can alert, log, and stop suspicious activity
False
IDSs cannot take action on security incidents; they only alert and log
To stop attacks, you must have an IPS
Where does the data from IDS logs go to prevent an attacker damaging or altering the logs?
Syslog server
Software that blocks external files containing JavaScript, images, or web pages from loading in a browser
Content filter
Software that filters website code as it is being downloaded from the server, and removes the advertisements
Adblock
A cybersecurity software or hardware solution that monitors the data of a system while in use, in transit, or at rest to detect attempts to steal the data
DLP (Data Loss Prevention)
Theft or unauthorized removal or movement of any data from a device
Exfiltration
Software-based client that monitors the data in use on a computer and can stop a file transfer or alert an admin of the occurrance.
Can be set to detection mode or prevention mode.
Endpoint DLP system
Software or hardware-based solution that is installed on the perimeter of the network to detect data in transit, focusing on data moving out of the network to catch data that should stay in the network.
Network DLP system
Software installed on servers in the datacenter to inspect the data at rest. The data should be encrypted and watermarked, and no one should be accessing it at times that they shouldn’t be.
Storage DLP system
Cloud software as a service that protects data being stored in cloud services
Cloud DLP system