Java Games: Flashcards, matching, concentration, and word search.

CNG 257 Chapter 1: Network Security Fundamentals

AB
Distributed Denial of Service Attack (DDoS)An attack that uses hijacked computers to flood a target and overwhelm it with excess traffic.
Trojan ProgramA piece of software that appears to perform a useful task, but secretly hides malicious functions.
MacroA type of script that provides automation.
BotnetConsists of many infected computers that are controlled by a single attacker.
Script KiddieTypically an unskilled programmer or attacker that makes use of commonly available exploits to attack a network.
Virtual Private Network (VPN)A network that uses a public network to provide access to a secured private network.
Restrictive PolicyDenies all traffic on a firewall by default, only specifically allowed traffic is permitted into the network.
NonrepudiationThe ability to log and trace any performed action over a secured network, preventing a participant from denying it performed an action.
SignaturesUsed by anti-virus software and IDPSs to identify threats
Mandatory Access Control (MAC)Relies on access being defined in advance by system administrators.
AuditingThe process of recording which computers are accessing a network and what resources are being accessed, and then recording the information in a log file.
Back DoorsWays of gaining unauthorized access to a computer or other resources, such as an unused port or terminal service
CrackersHackers who break into systems with the intent of doing harm or destroying data
Defense in Depth (DiD)A strategy for archiving information security that uses multiple layers of defense.
HactivistsComputer attackers with political goals.
IntegrityThe accuracy and consistency of information during its creation, transmission, and storage.
Logic BombMalware designed to be used at a specific time in the future or when a specified condition exists.
Packet FiltersHardware or software tools that allow or deny packets based on specified criteria, such as port, IP address, or protocol.
PortAn area in random access memory (RAM) reserved for the use of a program that "listens" for requests for the service it provides
SocketA network connection consisting of a port number combined with a computer's IP address.


Terri Johnson

This activity was created by a Quia Web subscriber.
Learn more about Quia
Create your own activities