| A | B |
| 2 firewall network design | best for large corporations |
| adware | form of spyware, used to collect information about user based on websites the user visits, commonly installed by a user in exchange for a free product |
| anti-spam software | for email sofware, could mistakenly classify legitimate email as spam and block it |
| anti-virus software | sofrware installed by end user to detect and remove viruses, worms, and Trojan horses from files and email |
| appliance based firewall | firewall build into a specific hardware device called a security appliance |
| brute force | type of attack that may result in DoS, fast computer is trying to guess passwords to gain access to user accounts |
| denial of service | attacks on computers wtih the intent to deny services to intended users, includes SYN flooding, ping of death, brute force, and DDos |
| DMZ | refers to an area of the netowrk that is acessbile by both internal and external host devices |
| integrated firewalls | firewall implented by adding firewall functionality to an existing device such as a router |
| Internet filter option | prevents outside intruders from attacking the router through the Internet |
| personal firewall | firewall residing on host computer |
| phishing | type of social engineering typically done via email where an attacker might ask for verification of information |
| ping of death | ping is sent with a packet greater in size than teh maximum allows |
| popups | annoying advertising windows that display when visiting a website, not intending to collect information |
| port forwarding | a Linksys integrated router wil only let external traffic that is destined for specific internal prts be permitted, all other traffic is denied |
| pretexting | type of social engineering typically done over the phone where an invented scenario is used to get victim information |
| server based firewall | firewall that consists of a firewall application taht runs on a network operating system such as UNIX, Windows, or Novell |
| spam | unwanted bulk mail sent by merchants advertising their products or services |
| SPI firewall protection option | when set to enabled, requires that packets coming into the router be responses to internal host requests |
| spyware | program that gathers personal information from your computer without your permission, invormation is sent to others over teh Internet and can include passwords and account numbers |
| SYN flooding | flood of packets with invalid source IP addresses requesting a connection |
| tracking cookies | form of spyware, used to record information about an Internet user when they visit websites, may be useful at times to save time |
| Trojan horse | program written to appear like a legitimate program, and example may be a box stating you won a prize, when the user opens the box, a program is installed and allows the intruder acess to their computer |
| virus | program that runs and spreads by modifying other programs, cannot start itself, must be activated, can be transmitted via email, downloaded files, instant message, or storage devices |
| vishing | type of social engineering typically done over Voice IP where an invented scenario is used to have the victim call a number wheich appears to be a legitimate bank and then has tehm verify their account numbers and passwords of their accounts |
| vulnerabiltiy analysis tool | one function fhtat is provided by this tool is teh identification of missing security updates on a computer |
| worm | similar to a virus by does NOT need to attach itself to an exisiting program in order for it to propagate inself across a network |