Module 4

Cards (28)

  • one-factor authentication, authenticates a username using just one, and only one, detail: the password
  • the two-factor authentication, authenticates the user using what the user has; and, this usually means a device, e.g. a security token, a dongle, an ATM card, or a mobile phone
  • three-factor authentication, authenticates the user using what the user is; and, this usually means a body-part that can identify an individual, e.g. fingerprint or retinal scan.
  • a firewall enforces access policies such as what services are allowed to be accessed by the network users
  • An email security application blocks incoming attacks and controls outbound messages to prevent the loss of sensitive data.
  • Anti-virus and anti-malware software. "Malware," short for "malicious software," includes viruses, worms, Trojans, ransomware, and spyware.
  • Network segmentation. You can assign access rights based on role, location, and more so that the right level of access is given to the right people and suspicious devices are contained and remediated.
  • Application security. Unfortunately, any application may contain holes, or vulnerabilities, that attackers can use to infiltrate your network.
  • Behavioral analytics. To detect abnormal network behavior, you must know what normal behavior looks like.
  • Cloud security is a broad set of technologies, policies, and applications applied to defend online IP, services, applications, and other imperative data. It helps you better manage your security by shielding users against threats anywhere they access the Internet and securing your data and applications in the cloud.
  • Data loss prevention. Organizations must make sure that their staff does not send sensitive information outside the network. Data loss prevention, or DLP, technologies can stop people from uploading, forwarding, or even printing critical information in an unsafe manner.
  • Intrusion prevention systems. An intrusion prevention system (IPS) scans network traffic to actively block attacks.
  • Mobile device security. Cybercriminals are increasingly targeting mobile devices and apps. Within the next 3 years, 90 percent of IT organizations may support corporate applications on personal mobile devices. Of course, you need to control which devices can access your network
  • Security information and event management. SIEM products pull together the information that your security staff needs to identify and respond to threats.
  • A virtual private network encrypts the connection from an endpoint to a network, often over the Internet.
  • A web security solution will control your staff’s web use, block web-based threats, and deny access to malicious websites. It will protect your web gateway on site or in the cloud
  • Wireless networks are not as secure as wired ones. Without stringent security measures, installing a wireless LAN can be like putting Ethernet ports everywhere, including the parking lot.
  • A port scanner is an application designed to probe a server or host for open ports. Such an application may be used by administrators to verify security policies of their networks and by attackers to identify network services running on a host and exploit vulnerabilities.
  • Wiretapping. It is the monitoring of telephone and Internet-based conversations by a third party, often by covert means.
  • The idle scan is a TCP port scan method that consists of sending spoofed packets to a computer to find out what services are available
  • encryption is the process of encoding information. This process converts the original representation of the information, known as plaintext, into an alternative form known as ciphertext.
  • A computer virus is a type of computer program that, when executed, replicates itself by modifying other computer programs and inserting its own code.
  • Eavesdropping is the act of secretly or stealthily listening to the private conversation or communications of others without their consent in order to gather information.
  • In computing, a denial-of-service attack (DoS attack) is a cyber-attack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to the Internet
  • DNS spoofing, also referred to as DNS cache poisoning, is a form of computer security hacking in which corrupt Domain Name System data is introduced into the DNS resolver's cache, causing the name server to return an incorrect result record, e.g. an IP address. This results in traffic being diverted to the attacker's computer.
  • SQL injection is a code injection technique, used to attack data-driven applications, in which malicious SQL statements are inserted into an entry field for execution (e.g. to dump the database contents to the attacker).
  • Phishing is the fraudulent attempt to obtain sensitive information or data, such as usernames, passwords and credit card details, by disguising oneself as a trustworthy entity in an electronic communication.
  • Cross-site scripting (XSS). Cross-site scripting (XSS) is a type of security vulnerability typically found in web applications