click below
click below
Normal Size Small Size show me how
Security + CompTIA
Domain 2
Term | Definition |
---|---|
Packet filtering firewalls | firewall that operates at layer 3 |
Proxy-service firewalls | firewall type; including circuit level (session layer Layer 5) and application level (application layer 7) |
Stateful inspection firewalls | deeper inspection firewall that analyze traffice patterns and data flows |
Stateless firewall | work as a basic access control list filter |
NIDS & NIPS | designed to catch attacks in progress within the network, not just on individual machines or the boundary between public & private networks |
Proxy Servers | placed between private network and internet for internet connectivity, can also be placed in ternally for web content caching |
Protocol analyzers | device that can be placed inline or between devices from which you want to capture the traffic |
Intrusion detection | managed by two basic methods: knowledge-based and behavior-based detection |
IDS | monitors packet data using behavior based (to identify anomalies or knowledge-based methods, operating in netowkr based or host based configurations |
Spanning Tree | Prevents broadcast loops on Layer 2, protocol |
Flood guard | firewall feature to control network activity associated with Dos attacks |
DMZ | Small network between internal and internet that provides a layer of privacy |
SIEM Tools | Security Information Event Management: these tools collect correlate and display data feeds that support response activities |
WORM technology | Write Once Read Many - ideal for log data which is written once and cannot be modified |
802.1X - Network Access Control | this access control offers a method of enforcement that helps ensure computers are properly configured. - TSA holding chamber |
VPN Concentrator | used to allow multiple external users to access internal network resources using secure features that are built into the device. multiple VPN tunnels |
HIDS - Host intrusion detection system, | implemented to monitor event and application logs, port access, and other running processes |
DLP - Data Loss Prevention - | way of preventing confidential data from being exfiltrated physically or logically from an organization by accident or on purpose |
HSM - Hardware Security Module - | designed to protect critical cryptographic keys and to accelerate sensitive cryptographic operations across a wide range of security applications. |
False positive | occurs when a typical or expected behavior is identified as irregular or malicious |
false negative | occurs when an alert that should have been generated did not occur |
honeypots & honeynets | used to study actions of hackers and distract them from more valuable data |
nmap | network scanning tool often used in security auditing |
netstat | shows network statistics which include protocol, local address, foreign address and connection state |
nbtstat | helps troubleshoot windows name resolution issues |
dig | troubleshooting tool that queries DNS servers |
Auditing user permissions | common method of identifying access violations and issues |
Common Firewall Config Errors | allows traffic to run from any source to any destination, unnecessary services running, weak authentication and log file negligence |
misconfigured web content filter | prevents legitimate content or allows prohibited content |
DEP - Data Execution Protection - | prevents malware from executing in memory space reserved for operating system processes |
File integrity checker | tool which computes cryptographic hash and compares the result to known good values to ensure file has not been modified |
HTTP Port # | 80 - unencrypted |
HTTPS port # | 443 |
FTP SSH TCP port | port 22 by default |