click below
click below
Normal Size Small Size show me how
Chapter 7 Terms
Security Class
| Term | Definition |
|---|---|
| Anomaly Based Monitoring | A monitoring technique used by an detection system that creates a baseline of normal activities and compares actions against the baseline whenever there is a signifigant deviation from this baseline an alarm is raised |
| Application Based Firewall | A firewall that can identify the applications that send packets through the firewall and then make decisions about the applications |
| Application Aware IDS | A specialized intrusion detection system that is capable of using contextual knowledge in real time |
| Application Aware IPS | An intrusion prevention system that knows information such as the application that are running as well as the underlying operating systems |
| Application Aware Proxy | A special proxy server that knows the applications that are running as well as the underlying operating system |
| Behavior Based Monitoring | A monitoring technique used by IDS that uses the normal processes and actions as the standard and compares actions against it |
| Content Inspection | Searching web content to match keywords |
| Defense in Depth | A defense that uses multiple types of security devices to protect a network also called layered security |
| Demilitarized Zone | A seperate network that rests outside the secure network perimeter untrusted outside users can access the dmz but cannot enter the secure network |
| Firewall Rules | A set of individual instructions to control the actions of a firewall |
| Heuristic Monitoring | A monitoring technique used by intrusioon detection system that uses an algorith to determine if a threat exsists |
| Host Based Intrusion Detection System | A software based application that runs on a local host computer that can detect an attack as it occurs |
| Intrusion Detection System | A device that detects an attack as it occurs |
| layered Security | A defense that uses multiple types of sucurity devices to protect a network |
| Load Balancer | A dedication network device that can direct requests to different servers based on a variety of factors |
| Maleware Inspections | Searching for malware in incoming web content |
| Network Access Control | A technique that examines the current state of a system or network device before it is allowed to connect to the network |
| Netwoek Address Translation | A technique that allows private IP addresses to be used on the public internet |
| Network Intrustion Detection Sysytem | A technology that watches for attacks on the network and reports back to a central device |
| Netowork Intrusion Prevention System | A technology that monitors network traffic to immediately react to block a malicious attack |
| Protocol Analyzer | Hardware or software that captures packets to decode and analyze their content |
| Proxy Server | A computer or an application program that intercepts user requests from the internal secure network and then processes those requess on behalf of the users |
| Remote Access | Any combination of hardware and software that enables remote users to access a local internal network |
| Reverse Proxy | A computer or an application program that routes incoming requests to the correct server |
| Router | A device that can forward packets across computer networks |
| Signature based monitoring | A monitoring technique used by an intrustion detection system that examines network traffic to look for well known patterns and compares the activities against a predefined signature |
| Subnetting | A technique that uses IP addresses to divide a network into network subnet and host |
| Switch | A device that connects network segments and forwards only frames intended for that specific device or frames sent to all devices |
| Unified Threat Manangement | Network Hardware that provides multiple security functions |
| URL Filtering | Restricting access to unapproved websites |
| Virtual LAN | a technology that enables use of an unsecured public network as if it were a secure private netowork |
| Virtual Private Network | A technology that enables uses of an unsecured public network as if it were a secure private network |
| VPN Concentrator | A device that aggregates VPN Connections |
| Web Application Firewall | A special type of application aware firewall that looks at the applications using HTTP |
| Web Security Gateway | A device that can block malicious content in real time as it appears without first knowing the URL of a dangerous site |