Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password

Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.
Security Systems Ch7 Matching
Protocol stack verification-
a process in which a network-based intrusion detection prevention system looks for invalid data packets
Padded cell
- honey pot that has been protected so that it cannot be easily compromised
Intrusion detection/prevention system (IDPS)
)- used to describe current anti-intrusion technologies
Intrusion
- occurs when an attacker attempts to gain entry or disrupt the normal operations of an information system, almost always with the intent to do harm
Fully distributed IDPS control strategy
all control functions are applied at the physical location of each IDPS component
Synchronous tokens
- synchronized with a server, both devices use the same time or a time-based database to generate a number that is displayed and entered during the user login phase
Statistical anomaly-based IDPS (stat IDPS) or behavior-based IDPS-
collects statistical summaries by observing traffic that is known to be normal
Passive vulnerability scanner-
one that listens in on the network and determines vulnerable versions of both server and client software
Intrusion prevention system (IPS)
– can detect an intrusion, and also prevent that intrusion from successfully attacking the organization by means of an active response
IDPS terrorists-
designed to trip the organization’s IDPS, essentially causing the organization to conduct its own
0:00

Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how
Created by: chels2407
Popular Computers sets