Network Security, Attacks and Firewalls Flashcards

Glossary (60 cards)

1
Q

bastion host

A

A single point of contact between the Internet and a private network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

blacklist

A

A list of IP addresses, URLs, keywords, or other items that are disallowed. When a blacklist is used, everything not on the blacklist is allowed. This is sometimes called a deny list.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

circuit level gateway firewall

A

A firewall that authenticates each user before granting access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

DMZ

A

Demilitarized Zone, a firewall type that consists of two firewalls with an intermediate zone between them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

DoS

A

Denial of Service, an attack that prevents legitimate users from accessing a resource.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

dual-homed host

A

A type of firewall that literally has two NICs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

firewall

A

A barrier between the network and the outside world.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

open source

A

Software where the source code itself is freely available to the public.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

operating system hardening

A

The process of securing an individual operating system. This includes proper configuration and applying patches.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

packet filter firewall

A

A firewall that scans incoming packets and either allows them to pass or rejects them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

packet sniffer

A

Software that intercepts packets and copies their contents.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

proxy server

A

A device that hides your internal network form the outside world.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

screened host

A

A combination of firewalls; in this configuration, you use a combination of bastion host and a screening router.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

whitelist

A

A list of IP addresses, URLs, characters, and so on that are allowed. When a whitelist is used, only those items on the whitelist are allowed; everything else is blocked. This is sometimes called an allow list.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

access control

A

The process of limiting access to some resource only to authorized users, programs, or systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

auditing

A

A check of a system’s security, usually including a review of documents, procedures, and system configurations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

authenticate

A

The process of verifying that a user is authorized to access some resource.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

binary numbers

A

Numbers that use the base 2 number system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

black hat hacker

A

A hacker with a malicious purpose, synonymous cracker.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

blocking

A

The act of preventing transmissions of some type.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

breach

A

To successfully break into a system (e.g., “to breach the security”).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

buffer overflow

A

An attack that seeks to overwrite a memory buffer with more data that it is designed to hold.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

dynamic security approach

A

An approach to security that is proactive rather than reactive.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

ethical hacker

A

One who hacks into systems in order to accomplish some goal that he or she feels is ethically valid.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
layered security approach
A security approach that also secures the internal components of the network, not just the perimeter.
26
malware
Any software that has malicious purpose such as a virus or Trojan horse.
27
NIC
Network interface card
28
Non-repudiation
The process of verifying a connection so that neither party can later deny, or repudiate, the transaction.
29
passive security approach
An approach to security that awaits some incident to react to, rather than being proactive.
30
perimeter security approach
A security approach that is concerned only with securing the perimeter of a network.
31
phreaker
Someone who hacks into phone systems.
32
phreaking
The process of hacking into a phone system.
33
script kiddie
A slang term for an unskilled person who purports to be a skilled hacker.
34
sneaker
Someone who is attempting to compromise a system in order to assess its vulnerability. This term is almost never used today; instead the term penetration tester or ethical hacker is used.
35
social engineering
The use of persuasion on human users in order to gain information required to access a system.
36
spyware
Software that monitors computer use.
37
war-dialing
Dialing phones waiting for a computer to pick up, usually done via some automated system.
38
war-driving
Driving and scanning for wireless networks that can be compromised.
39
white hat hacker
A hacker who does not break the law, often synonymous with ethical hacker.
40
grey hat hacker
A hacker whose activities are normally legal but occasionally delves into activities that may not be legal or ethical.
41
key logger
Software that logs key strokes on a computer.
42
code
The source code for a program, or the act of programming, as in "to code an algorithm."
43
DDoS
Distributed denial of service, a DoS attack launched from multiple sources.
44
distributed reflection denial of service
A specialized type of DDoS that uses Internet routers to perform the attack.
45
ICMP packets
Network packets often used in utilities such as Ping and Tracert.
46
IP spoofing
Making packets seem to some from a different IP address that they really originated from.
47
object
In reference to computer security models, an object is any file, device, or part of the system a user wishes to access.
48
Ping of Death
A DoS attack that sends a malformed ping packet hoping to cause the target machine to error out.
49
RST cookie
A simple method for alleviating the danger of certain types of DoS attacks.
50
session hacking
The process of taking over the session between a client and a server in order to gain access to the server.
51
Slammer
A famous Internet worm.
52
Smurf attack
A specific type of DoS attack that used broadcast packets sent to a router on the target network.
53
sniffer
A program that captures data as it travels across a network. Also called a packet sniffer.
54
spoofing
Pretending to be something else, as when a packet might spoof another return IP address (as in the Smurf attack) or when a website is spoofing a well-known e-commerce site.
55
stack tweaking
A complex method for protecting a system against DoS attacks. This method involves reconfiguring the operating system to handle connections differently.
56
stateful packet inspection
A type of firewall that not only examines packets but also knows the context within which the packet was sent.
57
SYN cookie
A method for ameliorating the dangers of SYN floods.
58
SYN flood
Sending a stream of SYN packets (requests for connection) and then never responding, thus leaving the connection half open.
59
Trin00
A tool used to execute DDoS attacks.
60
Trojan horse
Software that appears to have a valid and benign purpose but really has another, nefarious purpose.