CISA Chapter 10 - Network Security and Control

¡Supera tus tareas y exámenes ahora con Quizwiz!

Please Do Not Tell Sales People Anything

1 - Physical 2 - Data Link 3- Network 4 - Transport 5 - Session 6 - Presentation 7 - Application

Screened-Host Firewall

1 Bastian host and 1 packet filtering router

Transport Layer Security (TLS)

A communications protocol or system of rules that ensures privacy between communicating applications and their users on the Internet.

Bastion Host

A heavily secured server located on a special perimeter network between the company's secure internal network and its firewall.

Proxy

A mediator that stands between the internal and external networks.

Enabling MAC Filtering

Allowing access to only selected and authorized devices, restricting all other access.

Distributed Denial of Service (DDoS)

An attack where a firm's computer systems are flooded with thousands of seemingly legitimate requests, the sheer volume of which will slow or shut down the site's use. DDoS attacks are often performed via botnets.

Remote Access VPN

Authorized users can connect to the corporate network from anywhere.

Toll Fraud

Breaking into corporate VoIP system in order to place free long-distance and international telephone calls

Dual-Homed Firewall

Consists of one packet filtering router and 2 network interface cards

The best security for telecommunication networks

Dedicated lease lines

War Driving

Deliberately searching for Wi-Fi signals while driving by in a vehicle

Virtual Private Network (VPN)

Enables remote users and branch offices to access applications and resources available in private networks of the organization.

Open System Interconnection (OSI) Layers

Explains the layered steps of the network. There are 7 total layers.

Crosstalk

Happens when the signal from one cable gets mixed up with the signal from another cable.

Bridges

Have the same functionality as switches, that operate at layer 2 of the OSI.

Shielded Twisted Pair (STP)

Less prone to EMI and cross talk and the more reliable form of copper wire circuits.

Stateful Inspection

Monitors and tracks the destination of each packet that is being sent from the internal network.

Unshielded Twisted Pair (UTP)

More sensitive to the effects of EMI and crosstalk, should be avoided for long distances.

Routers

Operates at layer 3, connects 2 different networks and each network remains logically separate and can function as independent networks.

Gateway

The capability to translate and connect different protocols and networks. Acts as the 7th layer

Network Diagram

The first thing that an IS Auditor should evaluate to understand the network architecture and determine the inherent risks or single points of failure.

Attenuation

The loss or weakening of signal transmission.

Screened-Subnet Firewall (Demilitarized Zone)

The most secure type of firewall installation. Has 2 packet filtering routers with 1 bastion host.

Application-Level Firewall

The most secure type of firewalls operating at the app layer

Fiber-Optic Cables

The preferred choice for managing long-distance networks and handling high volumes of data.

Packet Filtering Router

The simplest and earliest version of a firewall.

WPA-2

The strongest encryption standard for wireless connection.

Voice over Internet Protocol (VoIP)

The transmission of voice and other content over IP networks.

Circuit-Level Firewall

Typically considered second-generation firewall technology. They work in a similar fashion to packet-filtering firewalls, but they operate at the transport and session layers of the OSI model.

Repeaters

Used to address the risk of attenuation (weakining of the signal)

Intranet VPN

Used to connect branch offices with an enterprise WAN.

Extranet VPN

Used to connect business partners and provide limited access to each other's corporate network.

Hubs and Switches

Used to connect different devices for the exchange of data.

Dynamic Host Configuration Protocol (DHCP)

allows dynamic IP address allocation so users do not have to have a preconfigured IP address to use the network


Conjuntos de estudio relacionados

Summer Reading: Secrets Lies and Algebra

View Set

Extension of the Wrist: Synergist & Antagonist Muscles

View Set

HESI Exit Practice Questions and Rationale (2)

View Set

Rise of Humans through Neolithic Revolution

View Set

Pediatric Chronic Diarrhea in Children

View Set

CH.10 Incremental Analysis: The Key to Decision-Making

View Set

Ch 14 and 15 public speaking exam

View Set