Chapter 7
Quiz yourself by thinking what should be in
each of the black spaces below before clicking
on it to display the answer.
Help!
|
|
||||
---|---|---|---|---|---|
Intrusion | show 🗑
|
||||
Intrusion detection systems (IDSs) | show 🗑
|
||||
show | – can detect an intrusion, and also prevent that intrusion from successfully attacking the organization by means of an active response
🗑
|
||||
show | )- used to describe current anti-intrusion technologies
🗑
|
||||
Network-based IDPS (NIDPS) | show 🗑
|
||||
Monitoring port | show 🗑
|
||||
show | a process in which a network-based intrusion detection prevention system looks for invalid data packets
🗑
|
||||
Application protocol verification- | show 🗑
|
||||
Passive mode- | show 🗑
|
||||
show | typically intended for network perimeter use, so they would be deployed in close proximity to the perimeter firewalls, often between the firewall and the Internet border router to limit incoming attacks that could overwhelm the firewall
🗑
|
||||
Host-based IDPS | show 🗑
|
||||
show | - benchmark and monitor the status of key system files and detect when an intruder creates, modifies, or deletes monitored files
🗑
|
||||
show | examines network traffic in search of patterns that match known signatures
🗑
|
||||
Signatures | show 🗑
|
||||
Statistical anomaly-based IDPS (stat IDPS) or behavior-based IDPS- | show 🗑
|
||||
show | as detected by an intrusion detection prevention system, the level of network activity that is established as a baseline and therefore activity volumes above that level are considered suspect
🗑
|
||||
show | process of comparing predetermined profiles of generally accepted definitions of benign activity for each protocol state against observed events to identify deviations
🗑
|
||||
show | the system reviews the log files generation by servers, network devices, and even other IDPSs, looking for patterns and signatures that may indicate that an attack or intrusion is in process or has already occurred
🗑
|
||||
show | designed to trip the organization’s IDPS, essentially causing the organization to conduct its own
🗑
|
||||
show | all IDPS control functions are implemented and managed in a central location
🗑
|
||||
show | all control functions are applied at the physical location of each IDPS component
🗑
|
||||
Partially distributed IDPS control strategy | show 🗑
|
||||
Honey pots | show 🗑
|
||||
show | - when a collection of honey pots connects several honey pot systems on a subnet
🗑
|
||||
Padded cell | show 🗑
|
||||
show | - an extension of the attractant technologies discussed in the previous section, are growing in popularity
🗑
|
||||
show | hack into a hacker’s system to find out as much as possible about the hacker
🗑
|
||||
Enticement- | show 🗑
|
||||
Entrapment- | show 🗑
|
||||
Attack protocol | show 🗑
|
||||
Footprinting | show 🗑
|
||||
show | systematic survey of all of the target organization’s Internet addresses
🗑
|
||||
show | tools used by both attackers and defenders to identify or fingerprint the computers that are active on a network, as well as the ports and services active on those computers, the functions and roles the machines are fulfilling, and other useful informati
🗑
|
||||
show | scan networks for highly detailed information
🗑
|
||||
show | one that listens in on the network and determines vulnerable versions of both server and client software
🗑
|
||||
Packet sniffer- | show 🗑
|
||||
show | security measures such as a badge reader that admits or prohibits people from entering sensitive areas
🗑
|
||||
show | a prospective user who, in the context of access control, seeks to use a protected system, logically access a protected service, or physically enter a protected space
🗑
|
||||
Strong authentication | show 🗑
|
||||
Password | show 🗑
|
||||
Passphrase | show 🗑
|
||||
Virtual password | show 🗑
|
||||
show | - contains a computer chip that can verify and validate a number of pieces of information instead of just a PIN
🗑
|
||||
Synchronous tokens | show 🗑
|
||||
show | - use a challenge response system- in which the server challenges the supplicant during login with a numerical sequence
🗑
|
||||
show | unique points of reference that are digitized and stored in an encrypted format when the user’s system access credentials are created
🗑
|
||||
False reject rate- | show 🗑
|
||||
False accept rate- | show 🗑
|
||||
Crossover error rate (CER | show 🗑
|
Review the information in the table. When you are ready to quiz yourself you can hide individual columns or the entire table. Then you can click on the empty cells to reveal the answer. Try to recall what will be displayed before clicking the empty cell.
To hide a column, click on the column name.
To hide the entire table, click on the "Hide All" button.
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.
To hide a column, click on the column name.
To hide the entire table, click on the "Hide All" button.
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.
Normal Size Small Size show me how
Normal Size Small Size show me how
Created by:
chels2407
Popular Computers sets