Java Games: Flashcards, matching, concentration, and word search.

SecurityChapter Five

Security (New Book) Ch. 5

AB
VLan, subnettingisolate sensitive traffic
Convergenceintegration of voice and data
DMZseparate network outside perimiter
NAT( Network Address Translation)hides IP address of internal devices
NAC(Network Access Control)prevents insecure networks from connecting
packet filter/firewallprevents malicious data from entering
Statefulwon't allow packet not requested
Rule basesets up actions to be taken on packets
proxy serversubstitutes its IP for clients
honey potdecoy to mislead hackers
reverse proxyroutes packets to correct server
NIDS( Network Intrusion Detection Sys.)monitors network for attacks and alerts or protects
NIPS(Network Intrusion Prevention Sys.)takes advanced steps if attack detected
Content filterblocks restricted sites
Integrated Network Security Hardwarelets devices like routers and switches work with security appliances
classful addressingIP split on boundaries between bytes
Cachetemporary storage area
core switchcarry traffic between switches
IP telephonyvoice applications over IP
multiplexvoice, video, data transported under universal format
out-of-bandusing separate data stream
PAT(Port address translatiion)assigns a different TCP port to each packet
Private addressused by internal network client
Production honeypotcaptures limited info regarding attacks on honeypot
research honeypotused by networks needing high security,ie- military
stateless packet filteringdenies packets only based on rules
subnettingdividing IP at any point in 32 bits
system callinterruts program, requests service from OS
VoIPvoice traffic on IP network
workgroup switchesconnected directly to device on network


Medina County Career Center

This activity was created by a Quia Web subscriber.
Learn more about Quia
Create your own activities