Computing Security Mod_6
spyware
software that monitors computer use
breach
to successfully break into a system.
ongoing virus scanner
virus scanning continually running in the backgroud
Intrusion Detection System (IDS)
A system designed to detect signs of attacks in progress and to notify the administrato
IDS signatures
Characteristics of specific types of attacks that intrusion detection systems look for
port scanning
Scanning a target machine to see what ports are open in an attempt to assess vulnerabilities
Terminate and Stay Resident (TSR)
Software that stays loaded in memory even if it shuts down
on-demand virus scanners
Virus scanning that runs when requested by the user
firewall
a device or software that provides a barrier between your machine or network and the rest of the world
dual-homed host
a firewall that actually has two network interface cards, thus participating in two networks
screened host
a firewall, usually on the perimeter of a network, that combines a packet-filtering router with an application gateway located on the protected subnet side of the router; also called a screening firewall
bastion host
a gateway between an inside network and an outside network. Used as a security measure, it is designed to defend against attacks aimed at the inside network.
proxy server
a machine or software that hides all internal network IP addresses from the outside world. It provides a point of contact between a private network and the Internet
anomaly detection
a process to look for system behavior that is not normal. This process is used by many intrusion detection systems
stateful packet inspection (SPI)
a type of firewall process in which each packet and its contents are examined, in which the inspection does not involve actually examining the contents of each packet, nor does it examine a packet within the context of an ongoing TCP conversation
application gateway
a type of firewall that authenticates entire client applications
application proxy
another name for an application gateway
application-level proxy
another name for an application gateway
hardening
the process to secure all aspects of a server. This includes adding patches, shutting off unnecessary services, making sure all settings are secure, and so forth