Term
information security deals with what? |
|
Definition
information and information systems |
|
|
Term
|
Definition
computer processing is distributed over two or more computers |
|
|
Term
what is a computer network |
|
Definition
a collection of computers connected together to enable sharing of resources |
|
|
Term
a computer is connected to a network via a ____ |
|
Definition
|
|
Term
|
Definition
computer sending info on network |
|
|
Term
|
Definition
requires addressing to get to |
|
|
Term
ISO OSI reference model shows what |
|
Definition
the many things that are needed to coordinate between two devices in order to communicate |
|
|
Term
what does the ISO OSI reference model use? |
|
Definition
|
|
Term
7 layers in client server |
|
Definition
1 application 2 presentatino 3 session 4 transport 5 network 6 data link 7 physical |
|
|
Term
what 3 layers are called packet layers? |
|
Definition
network, data link, and physical |
|
|
Term
OSI is theoretical tool....most common implementation is ____ |
|
Definition
|
|
Term
challenge with connecting internal network to internet is ____ |
|
Definition
inability to provide physical security |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
IPSec is used with IPv4 and IPv6 and has what 2 protocols? |
|
Definition
authentication header - provides the services authentication of origin and data integrity
encapsulating security payload - provides the service of confidentiality by encrypting data |
|
|
Term
IPSec has 2 modes what are they? |
|
Definition
|
|
Term
IPSec transport mode is applies to the IP payload...the payload is protected by the IP header is not....this si good for what? |
|
Definition
end-to-end communication between hosts |
|
|
Term
IPSec tunnel mode is applies to the entire IP packet...header and payload is sent encrypted...this is good for what? |
|
Definition
intermediate devices in a communications path |
|
|
Term
Secure Sockets Layer (SSL) is internet standard known as Transport Layer Security (TLS)...it allows what? |
|
Definition
allows two systems to negotiate algorithms, transfer data with MACs for authentication or origin and data integrity, encrypted for confidentiality |
|
|
Term
|
Definition
a system component designed to provide security between a trusted internal network and untrusted external network |
|
|
Term
simplest type of fire wall is a ___ filter...what does it do |
|
Definition
stateless packet filter....examines the header of an IP packet and uses programmed policy rules to determine whether the packet should be forwarded or not |
|
|
Term
|
Definition
servers that are designed to serve requests from outside are placed in DMZ |
|
|
Term
DMZ screened host..what is it |
|
Definition
place DMZ behind fire wall separate from trusted network |
|
|
Term
DMZ screened subnet is what? |
|
Definition
DMZ is hidden between external router and internal router |
|
|
Term
DMZ multi_homed host is used for what? and what is it? |
|
Definition
used to implement policy rules regarding transfer of data between the three zones...requests from outside are never allowed to internal servers, only to DMZ servers that then forward it to internal server |
|
|
Term
what is Network address translation (NAT)? |
|
Definition
a technique that allows a network device to associate an external IP address with one or more internal IP addresses that are non-routable and translate addresses fro data traffic in each direction |
|
|
Term
|
Definition
allows multiple devices to share an single IP address |
|
|
Term
|
Definition
network-based host-based - usually a server application-based |
|
|
Term
Signature based IDS does what? |
|
Definition
examings the data content of network packets, files and other data resources and recognizing signatures |
|
|
Term
anomaly based IDS does what? |
|
Definition
compaing the activities of one process with the expected behavior/profile for that type of process |
|
|
Term
|
Definition
a host designed to attract attackers |
|
|
Term
|
Definition
when an IDS detects an attack in progress...it sends data to a padded cell where a hacker can try to cause damage but cant |
|
|