Chapter 7
Help!
|
|
||||
---|---|---|---|---|---|
Intrusion | show 🗑
|
||||
show | devices that detect unauthorized activity within the inner network or an individual machine
🗑
|
||||
Intrusion prevention system (IPS) | show 🗑
|
||||
Intrusion detection/prevention system (IDPS) | show 🗑
|
||||
Network-based IDPS (NIDPS) | show 🗑
|
||||
show | - specially configured connection on a network device that is capable of viewing all of the traffic that moves through the entire device
🗑
|
||||
show | a process in which a network-based intrusion detection prevention system looks for invalid data packets
🗑
|
||||
show | the higher-order protocols are examined for unexpected packet behavior or improper use
🗑
|
||||
show | use same connection methods as network-based IDPS
🗑
|
||||
Inline sensors- | show 🗑
|
||||
show | - resides on a particular computer or server, known as the host, and monitors activity only on that system
🗑
|
||||
System integrity verifiers | show 🗑
|
||||
show | examines network traffic in search of patterns that match known signatures
🗑
|
||||
Signatures | show 🗑
|
||||
show | collects statistical summaries by observing traffic that is known to be normal
🗑
|
||||
Clipping level- | show 🗑
|
||||
Stateful protocol analysis (SPA) | show 🗑
|
||||
Log file monitor (LFM)- | show 🗑
|
||||
show | designed to trip the organization’s IDPS, essentially causing the organization to conduct its own
🗑
|
||||
show | all IDPS control functions are implemented and managed in a central location
🗑
|
||||
show | all control functions are applied at the physical location of each IDPS component
🗑
|
||||
show | an intrusion detection prevention system control strategy in which individual agents can still analyze and respond to local threats, but they are required to report to a hierarchical central facility which creates a blended approach that enables the organ
🗑
|
||||
Honey pots | show 🗑
|
||||
Honey net | show 🗑
|
||||
Padded cell | show 🗑
|
||||
show | - an extension of the attractant technologies discussed in the previous section, are growing in popularity
🗑
|
||||
Back hack- | show 🗑
|
||||
show | process of attracting attention to a system by placing tantalizing information in key locations
🗑
|
||||
show | the action of luring an individual into committing a crime to get a conviction
🗑
|
||||
show | - a series of steps or processes used by an attacker in a logical sequence to launch an attack against a target system or network
🗑
|
||||
show | - the organized research of the Internet addresses owned or controlled by a target organization
🗑
|
||||
show | systematic survey of all of the target organization’s Internet addresses
🗑
|
||||
Port scanners- | show 🗑
|
||||
show | scan networks for highly detailed information
🗑
|
||||
show | one that listens in on the network and determines vulnerable versions of both server and client software
🗑
|
||||
show | sometimes called a network protocol analyzer is a network tool that collects copies of packets from the network and analyzes them
🗑
|
||||
show | security measures such as a badge reader that admits or prohibits people from entering sensitive areas
🗑
|
||||
show | a prospective user who, in the context of access control, seeks to use a protected system, logically access a protected service, or physically enter a protected space
🗑
|
||||
Strong authentication | show 🗑
|
||||
Password | show 🗑
|
||||
Passphrase | show 🗑
|
||||
Virtual password | show 🗑
|
||||
show | - contains a computer chip that can verify and validate a number of pieces of information instead of just a PIN
🗑
|
||||
show | - synchronized with a server, both devices use the same time or a time-based database to generate a number that is displayed and entered during the user login phase
🗑
|
||||
show | - use a challenge response system- in which the server challenges the supplicant during login with a numerical sequence
🗑
|
||||
Minutiae- | show 🗑
|
||||
show | the percentage of identification instances in which authorized users are denied access a result of a failure in the biometric device
🗑
|
||||
show | the percentage of identification instances in which unauthorized users are allowed access to systems or areas as a result of a failure in the biometric device
🗑
|
||||
show | )- the level at which the number of false rejections equals the false acceptances, and is also known as the equal error rate
🗑
|
Review the information in the table. When you are ready to quiz yourself you can hide individual columns or the entire table. Then you can click on the empty cells to reveal the answer. Try to recall what will be displayed before clicking the empty cell.
To hide a column, click on the column name.
To hide the entire table, click on the "Hide All" button.
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.
To hide a column, click on the column name.
To hide the entire table, click on the "Hide All" button.
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.
Normal Size Small Size show me how
Normal Size Small Size show me how
Created by:
chels2407
Popular Computers sets