click below
click below
Normal Size Small Size show me how
Security + CompTIA
Domain 2
| Term | Definition |
|---|---|
| Packet filtering firewalls | firewall that operates at layer 3 |
| Proxy-service firewalls | firewall type; including circuit level (session layer Layer 5) and application level (application layer 7) |
| Stateful inspection firewalls | deeper inspection firewall that analyze traffice patterns and data flows |
| Stateless firewall | work as a basic access control list filter |
| NIDS & NIPS | designed to catch attacks in progress within the network, not just on individual machines or the boundary between public & private networks |
| Proxy Servers | placed between private network and internet for internet connectivity, can also be placed in ternally for web content caching |
| Protocol analyzers | device that can be placed inline or between devices from which you want to capture the traffic |
| Intrusion detection | managed by two basic methods: knowledge-based and behavior-based detection |
| IDS | monitors packet data using behavior based (to identify anomalies or knowledge-based methods, operating in netowkr based or host based configurations |
| Spanning Tree | Prevents broadcast loops on Layer 2, protocol |
| Flood guard | firewall feature to control network activity associated with Dos attacks |
| DMZ | Small network between internal and internet that provides a layer of privacy |
| SIEM Tools | Security Information Event Management: these tools collect correlate and display data feeds that support response activities |
| WORM technology | Write Once Read Many - ideal for log data which is written once and cannot be modified |
| 802.1X - Network Access Control | this access control offers a method of enforcement that helps ensure computers are properly configured. - TSA holding chamber |
| VPN Concentrator | used to allow multiple external users to access internal network resources using secure features that are built into the device. multiple VPN tunnels |
| HIDS - Host intrusion detection system, | implemented to monitor event and application logs, port access, and other running processes |
| DLP - Data Loss Prevention - | way of preventing confidential data from being exfiltrated physically or logically from an organization by accident or on purpose |
| HSM - Hardware Security Module - | designed to protect critical cryptographic keys and to accelerate sensitive cryptographic operations across a wide range of security applications. |
| False positive | occurs when a typical or expected behavior is identified as irregular or malicious |
| false negative | occurs when an alert that should have been generated did not occur |
| honeypots & honeynets | used to study actions of hackers and distract them from more valuable data |
| nmap | network scanning tool often used in security auditing |
| netstat | shows network statistics which include protocol, local address, foreign address and connection state |
| nbtstat | helps troubleshoot windows name resolution issues |
| dig | troubleshooting tool that queries DNS servers |
| Auditing user permissions | common method of identifying access violations and issues |
| Common Firewall Config Errors | allows traffic to run from any source to any destination, unnecessary services running, weak authentication and log file negligence |
| misconfigured web content filter | prevents legitimate content or allows prohibited content |
| DEP - Data Execution Protection - | prevents malware from executing in memory space reserved for operating system processes |
| File integrity checker | tool which computes cryptographic hash and compares the result to known good values to ensure file has not been modified |
| HTTP Port # | 80 - unencrypted |
| HTTPS port # | 443 |
| FTP SSH TCP port | port 22 by default |