Term
What do firewalls do with packets? |
|
Definition
Examines each packet passing through making sure its not a provable attack. |
|
|
Term
|
Definition
Filters traffic passing between different parts of the site's internal network. |
|
|
Term
|
Definition
Firewall examines packets entering the network from the outside. |
|
|
Term
|
Definition
The firewal filters packets when they are leaving the network. |
|
|
Term
What does it mean that a firewall should operate at wire speed? |
|
Definition
Firewalls must have the capacity to handle the incoming traffic volume with heavy attacks. |
|
|
Term
|
Definition
Sits at the boundary between the corporate site and the external Internet. |
|
|
Term
|
Definition
The maximum speed of data coming into each port. |
|
|
Term
Stateful Packet Inspection (SPI) |
|
Definition
Firewall filtering mechanism that nearly all main border firewalls use as their primary inspection mechanism. |
|
|
Term
Which port number is well-known for "Port 80?" |
|
Definition
|
|
Term
Which port number is well-known for "Port 20/21?" |
|
Definition
|
|
Term
Which port number is well-known for "Port 22?" |
|
Definition
|
|
Term
Which port number is well-known for "Port 25?" |
|
Definition
Simple Mail Transfer Protocol (SMTP) |
|
|
Term
Which port number is well-known for "Port 53?" |
|
Definition
|
|
Term
Intrusion Detection Systems (IDSs) |
|
Definition
Examines streams of packets to look for suspicious activities that indicate possible attacks. Similar to a car or house alarm once the IDS suspects suspicious movement in progress it'll send an alarm message to the security adminstrator. |
|
|
Term
Intrusion Prevention Systems (IPSs) |
|
Definition
Use IDS filtering mechanisms and allowed to stop traffic at the high end of the attack confidence spectrum. |
|
|
Term
|
Definition
Series of a rules that are exceptions to the default behavior. |
|
|
Term
|
Definition
ACLs internally initiate connection-opening attempts specify conditions under which it should be prevented. |
|
|
Term
|
Definition
ACLs externally initiate connection-opening attempts specify conditions under which certain attempts should be accepted. |
|
|
Term
|
Definition
A period, phase, or stage in a connection. A distinct phase in a connection between two applications. |
|
|
Term
|
Definition
Persistent conversations between different computers. |
|
|
Term
How is a connection represented? |
|
Definition
It's used like a telephone in a conversation between two people. |
|
|
Term
Why are stateful packets inspections firewalls inexpensive? |
|
Definition
Simple for packets that do not attempt to open a connection. Consequently, nearly all are handled quickly. |
|
|
Term
Network Address Translation (NAT) |
|
Definition
Used in firewalls that use various types of examination methods as a second type of protection. |
|
|
Term
|
Definition
Consist of the NAT firewall and places the internal socket and the external socket in the table. |
|
|
Term
|
Definition
Translate network IP addresses and port numbers. |
|
|
Term
|
Definition
Provides automatic protection offered by application proxy firewalls unlike the SPI. Hides the internal IP addresses, header destruction, and protocol fidelity. |
|
|
Term
|
Definition
A subnet that contains all of the servers and application proxy firewalls that must be accessible to the outside world. |
|
|
Term
|
Definition
A source that captures packets and notes the IP address that allows attackers to learn about the network's host IP address and have access to their port numbers without sending a probe packets. |
|
|
Term
Characteristics of sniffers |
|
Definition
Ability to send attacks packets to the available IP adresses and port numbers. |
|
|
Term
Why are deep packet inspections important? |
|
Definition
Examines all fields of the packet, including the IP header, the TCP/UDP header, and the application message. |
|
|
Term
|
Definition
Instead of just individual packets for dangerous pattenrs is very processing-intensive. |
|
|
Term
Why do half open (SYN flooding) DoS attacks cause problems for servers? |
|
Definition
The packets have the same format as the legitimate packets. |
|
|
Term
What can be done to to stop half-open DoS attacks? |
|
Definition
Companies that own infected computers must stop their computers from sending out DoS attack packets. |
|
|
Term
Three hosts thst are usually placed in DMZ? |
|
Definition
Public webservers, Application Proxy Servers, and a DNS server that only knows the host names and IP addreses within DMZ. |
|
|
Term
Why is vulnerability testing necessary? |
|
Definition
To detect if the ACL rules are intact due to the complexity of writing each rule and to make sure all the rules went through during the installation process. |
|
|
Term
|
Definition
Contains selected data from each packets that was dropped |
|
|
Term
How can attackers avoid the border firewall? |
|
Definition
Avoid the firewall filtering completely. Work with someone that's already apart of the network. Attack and compromise an internal computer. Allow drive-by hackers to enter the site with an access point. Compromise the users personal devices when they connect to the network with their tablets and phone and other devices. |
|
|
Term
|
Definition
A new attack that are made before signatures are defined. |
|
|
Term
|
Definition
The policy-driven control of access to systems, data, and dialogues. |
|
|
Term
|
Definition
The process of assessing the identity of each individual claiming to have permission to use a resource. |
|
|
Term
|
Definition
Specific permissions that a particular authenticated user should have, given his or her authenticated identity. |
|
|
Term
|
Definition
Collecting information about an individual's activities in log files. |
|
|
Term
Four bases of authentication credentials |
|
Definition
What you know (a pasword or private key), What you have(a physical key or a smart card), Who you are(your fingerprint), What you do(how you specifically pronounce a passphrase) |
|
|
Term
Two factor of authentication |
|
Definition
Using two credentials in order to gain to private information such as a verbal voice recognition and an active smart card key to scan with pin. |
|
|
Term
Role-Based Access Control (RBAC) and its benefits |
|
Definition
Cheaper and less error-prone than basing access rules on individual accounts |
|
|
Term
ISO/IEC 27002's Security Clause 9 |
|
Definition
Physical and environmental security: securing offices, rooms, and facilities. |
|
|
Term
Controls for equipment disposals/reuse and offsite equipment maintenance. |
|
Definition
Only authorized people are allowed access to the equipment. The equipment must be logged off and logged back in with the users' specification. |
|
|
Term
|
Definition
Enforcing entrance controls is very dificult because of a social engineering trick. |
|
|
Term
|
Definition
An attacker goes through a firm's trash bins looking for documents, backup tapes, floppy disks, and other information-carrying media. |
|
|
Term
|
Definition
Passwords used for weeks and/or months at a time. |
|
|
Term
|
Definition
Passwords is only used once. |
|
|
Term
Why is password cracking over a network difficult? |
|
Definition
Once you try to log in and repeatedly use the wrong information the account will lock itself and it'll frustrate attackers that try to attempt to hack the account. |
|
|
Term
What is brute-force password guessing? |
|
Definition
Try to decipher the password using the 26 alphabetic characters, or 52 upper and lower case letters, or 62 alphanumeric characters, or using all 75 characters available on a modern keyboard. |
|
|
Term
What is a dictionary attack? |
|
Definition
Depicting of random passwords that are commonly used. |
|
|
Term
|
Definition
The longer the password increases the difficulty for hackers to break and figure out your passwords. |
|
|
Term
|
Definition
Authentication cards that contain data on a magnetic stripe. |
|
|
Term
|
Definition
Authentication card that contains a microprocessor. |
|
|
Term
What is the attraction of proximity tokens? |
|
Definition
By simply walking up to the computer or door you'll be granted access after you authorize your information into the system. |
|
|
Term
What is a personal indentification number (PIN)? |
|
Definition
Passwords that are used with physical access devices that are usually four to six digits long. |
|
|
Term
What is biometric authentication? |
|
Definition
Based on something you are or something you do. Make reusable passwords obsolete. |
|
|
Term
What is false acceptance? |
|
Definition
A match to a template that should not be made. |
|
|
Term
|
Definition
The supplicant is incorrectly rejected as a match to a template when the applicant should be accepted as a match. |
|
|
Term
Which is worst false acceptance or rejection? |
|
Definition
Depending on the content they both aren't good, but overall false rejection is a major security violation. |
|
|
Term
What is failure to enroll? |
|
Definition
A type of error that occurs when the system doesn't enrolla user. |
|
|
Term
|
Definition
A supplicant claims to be a particular person, and the challenge is to measure the supplicant's biometric access data against the template of the person he or she claims to be. |
|
|
Term
|
Definition
The supplicant doesn't claim to be a particular person in contrast. |
|
|
Term
What will be the FAR for verification? |
|
Definition
One in a thousand, 0.1 percent. |
|
|
Term
What will be the FAR for identification? |
|
Definition
|
|
Term
What is the principle of least permissions? |
|
Definition
Each person should only get the permissions that he or she absolutely needs to do his or her job. |
|
|
Term
|
Definition
Records and analyzes what the person or program actually did. |
|
|
Term
What is Death of the perimeter? |
|
Definition
A phrase used by network administrators to convey the idea that creating a 100 percent secure network is impossible. |
|
|
Term
The purpose for DoS attacks |
|
Definition
To cause harm, in regards to to corporations this can comein the form of losses related to online sales, industry reputation, employee productivity, or customer loyalty. |
|
|
Term
|
Definition
Flooding the victim directly. |
|
|
Term
|
Definition
Spoofing the source address and then flood the victim. |
|
|
Term
|
Definition
Handler can update the software to change the type attack the bot can do, Peer-to-peer redirect. |
|
|
Term
|
Definition
Incorrectly configured router, Broadcasts to internal hosts. |
|
|
Term
|
Definition
Causes a victim to crash, Ping of death, SMS of death. |
|
|
Term
|
Definition
Direct or indirect attacks can only succeed if the attacker can flood the victim with more requests than the victim can handle. |
|
|
Term
|
Definition
Attackers don't like to send direct attacks, therefore they use spoofed IP addresses that hide their original IP address from being visible. |
|
|
Term
|
Definition
When a victim sends responses to the spoofed IP address used by the attacker, and inadvertently floods an unintended victim. |
|
|
Term
|
Definition
A victim is flooded with SYN packets in an attempt to make many half-open TCP connections. |
|
|
Term
|
Definition
A victim is flooded with ICMP packets that appear to be normal supervisory traffic. |
|
|
Term
|
Definition
Black Holing, Validating the Handshake, Rate Limiting |
|
|