Computing Security Mod_6

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

spyware

software that monitors computer use

breach

to successfully break into a system.

ongoing virus scanner

virus scanning continually running in the backgroud

Intrusion Detection System (IDS)

A system designed to detect signs of attacks in progress and to notify the administrato

IDS signatures

Characteristics of specific types of attacks that intrusion detection systems look for

port scanning

Scanning a target machine to see what ports are open in an attempt to assess vulnerabilities

Terminate and Stay Resident (TSR)

Software that stays loaded in memory even if it shuts down

on-demand virus scanners

Virus scanning that runs when requested by the user

firewall

a device or software that provides a barrier between your machine or network and the rest of the world

dual-homed host

a firewall that actually has two network interface cards, thus participating in two networks

screened host

a firewall, usually on the perimeter of a network, that combines a packet-filtering router with an application gateway located on the protected subnet side of the router; also called a screening firewall

bastion host

a gateway between an inside network and an outside network. Used as a security measure, it is designed to defend against attacks aimed at the inside network.

proxy server

a machine or software that hides all internal network IP addresses from the outside world. It provides a point of contact between a private network and the Internet

anomaly detection

a process to look for system behavior that is not normal. This process is used by many intrusion detection systems

stateful packet inspection (SPI)

a type of firewall process in which each packet and its contents are examined, in which the inspection does not involve actually examining the contents of each packet, nor does it examine a packet within the context of an ongoing TCP conversation

application gateway

a type of firewall that authenticates entire client applications

application proxy

another name for an application gateway

application-level proxy

another name for an application gateway

hardening

the process to secure all aspects of a server. This includes adding patches, shutting off unnecessary services, making sure all settings are secure, and so forth


Ensembles d'études connexes

Chapter 4 Interpersonal Communication

View Set

26. Understanding the Balance Sheet (Sch, CFA)

View Set

Week 14 Journeyman Practice Test 4

View Set