Question | Answer |
Honeypot | a computer security mechanism set to detect, deflect, or, in some manner, counteract attempts at unauthorized use of information systems. |
Perimeter Networks | -the network closest to a router that is not under your control. -the final step a packet takes traversing one of your networks on its way to the internet; and conversely the first network encountered by incoming traffic from the Internet. |
NAT Network Address Translation | translates the IP addresses of computers in a local network to a single IP address. This address is often used by the router that connects the computers to the Internet |
VPN | a network that is constructed using public wires — usually the internet — to connect remote users or regional offices to a company's private, internal network. |
IPsec Internet Protocol Security | is a secure network protocol suite that authenticates and encrypts the packets of data to provide secure encrypted communication between two computers over an Internet Protocol network. It is used in virtual private networks (VPNs). |
Server Isolation | a policy design where you assign servers to a zone that allows access only to users and devices that authenticate as members of an approved network access group (NAG) |
domain isolation | a policy design where you configure the computers on your network to accept only connections coming from computers that are authenticated as members of the same isolated domain. This design typically begins with a network configured as described in the Basic Firewall Policy Design section. |
Protocol Security | A sequence of operations that ensure protection of data. Used with a communications protocol, it provides secure delivery of data between two parties. The term generally refers to a suite of components that work in tandem |
Protocol Spoofing | used in data communications to improve performance in situations where an existing protocol is inadequate, for example due to long delays or high error rates. |
Tunneling | a communications protocol that allows for the movement of data from one network to another. It involves allowing private network communications to be sent across a public network (such as the Internet) through a process called encapsulation. |
encapsulation | one of the fundamentals of OOP (object-oriented programming). It refers to the bundling of data with the methods that operate on that data. |
DNSsec Domain Name System Security Extensions | a suite of Internet Engineering Task Force (IETF) specifications for securing certain kinds of information provided by the Domain Name System (DNS) as used on Internet Protocol (IP) networks. |
Network sniffing | monitors or sniffs the data flowing over computer network links in real time |
DOS Denial of Service | a cyber-attack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to the Internet. |
Want to create your own Flashcards for free with GoConqr? Learn more.