Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
30 Cards in this Set
- Front
- Back
account lockout
|
Refers to the number of incorrect logon attempts permitted before a system locks an account. Each bad logon attempt is tracked by the bad logon counter. and when the counter exceeds the account lockout threshold, no further logon attempts are permitted.
|
|
cracked password
|
A password that gets access to an encrypted password file from a workstation or server. Once he or she has access , the attacker starts running password cracking tools against the files, with an eye toward breaking as many passwords as possible and leveraging then to further compromise the company's network and systems.
|
|
dictionary attack
|
An attack that uses a dictionary containing an extensive list of potential passwords that the hacker then tries in conjunction with a user ID in an attempt to guess the appropriate password.
|
|
Group Policy Object (GPO)
|
A set of rules that allow an administrator granular control over the configuration of objects in Active Directory (AD), including user accounts, operating systems, applications, and other AD objects.
|
|
keylogger
|
A software of hardware device that captures passwords and other critical data directly from the keyboard.
|
|
password
|
A secret series of characters that enables a user to access a particular file, computer, or program.
|
|
sniffers
|
a specially designed software (and in some cases hardware) applications that capture network packets as they traverse a network, displaying them for the attacker.
|
|
strong password
|
a password that is hard to guess because it is long and has a mix of different types of characters. It also has random enough where it could not be easily guessed.
|
|
application-level firewall
|
Also known as proxy servers. Works by performing a deep inspection of application data as it traverses the firewall. Rule are set by analyzing client requests and application responses, then enforcing correct application behavior.
|
|
circuit-level firewall
|
Typically considered second-generation firewall technology. They work in a similar fashion to packet-filtering firewalls, but they operate at the transport and session layers of the OSI model.
|
|
DMZ (demilitarized zone)
|
A firewall configuration used to secure hosts on a network segment. in most DMZ's, the host on the DMZs, the hosts on the DMZ are connected behind a firewall that is connected to a public network like the internet. |
|
DNS Security Extensions (DNSsec)
|
Adds security provisions to DNS so that computers can verify they have been directed to proper servers.
|
|
DNS poisoning
|
An attack against the cached information on your DNS server.
|
|
DNS spoofing
|
DNS spoofing occurs when an attacker is able to intercept a DNS request and respond to the request before the DNS server is able to.
|
|
firewall
|
A system that is designed to protect a computer or a computer network from network based attacks. A firewall does this by filtering the data packets that are traversing the network.
|
|
Honey net
|
A collection of honeypots used to present an attacker with an even more realistic attack environ ment.
|
|
Honeypot
|
A trap for hackers
|
|
host firewall
|
A type of software firewall installed on a host and used to protect the host from network-based attacks.
|
|
intrusion detection systems (IDS)
|
A solution designed to detect unauthorized user activities, attacks, and network compromises.
|
|
intrusion prevention systems (IPS)
|
A solution designed to detect unauthorized user activities, attacks, and network compromises that can also take action to prevent a breach from occurring.
|
|
MAC address
|
The physical or hardware address burned into each NIC (for example, 96-4C-E5-48-78-C7)
|
|
Network Access Protection (NAP)
|
A Microsoft solution that allows administrators a more powerful way to control access to network resources. NAP's controls are based on the client computer's identity and whether that computer complies with the configured network.
|
|
network firewall
|
A category of software firewall consists of applications that are installed on servers used to protect network segments from other network segments.
|
|
Open Systems Interconnect (OSI)
|
The OSI model is a conceptual model, created by the International Organization for Standardization (ISO) to describe a network architecture that allows the passage of data between computer systems. Although never fully utilized as model for a protocol, the OSI model is nonetheless the standard for discussing how networking works.
|
|
padded cell
|
A system that waits for an IDS to detect an attacker and then transfers the attacker to a special host where he or she cannot do any damage to the production environment.
|
|
personal firewall
|
A type of software firewall installed on a host and sued to protect the host from network based-attacks.
|
|
Secure Content Manager (SCM)
|
Software protection against spyware, phishing, viruses, and email spam.
|
|
spoofing
|
the misuse of a network protocol to perpetrate a hoax on a host or network device.
|
|
stateful inspection
|
In addition to examining the header information of the packets traversing the firewall, a Stateful inspection firewall considers other factors when determining whether traffic should be permitted across the firewall. Stateful inspection also determines whether a packet is part of an existing session, and that information can be used to decide whether to permit or deny a packet.
|
|
Unified Threat Management (UTM)
|
A comprehensive security product that includes protection against multiple threats. A UTM product typically includes a firewall, antivirus software, content filtering and a spam filter in a single integrated package.
|