Review - from Wk4 to Wk6
Across
- 2. the primary use is to interconnect various network segments, they usually provide basic traffic filtering capabilities.
- 6. (9,8) where you could backup or copy all your data to i.e. a NAS, or an external hard drive
- 7. can block or deny traffic based on a positive rule or signature match.
- 8. You should also use this encrypted service to prevent others from intercepting your information over a public wireless network.
- 10. (9,3,9) (aka quid pro quo) This is when an attacker requests personal information from someone in exchange for something, like a gift.
- 11. (3-2-3-6) attack happens when a cybercriminal takes control of a device without the user’s knowledge. With this level of access, an attacker can intercept and capture user information before it sends it to its intended destination.
- 12. These systems use signatures or behavioural analysis of applications to identify and block malicious code from being executed.
- 13. (7,5) a firewall that operate at the OSI layer 3, it filters communications based on source and destination IP addresses.
- 15. (6-2-7) attacks are a type of network attack that is relatively simple to carry out, even by an unskilled attacker. A DoS attack results in some interruption of network service to users, devices, or applications.
- 16. (7,7,11) a firewall that hides or masquerades the private addresses of network hosts, NAT.
- 17. (3,6,14) adds an extra layer of security for account logins. Besides your username and password or personal identification number (PIN), requires a second token to verify your identity.
Down
- 1. (4,8) application running on a device identifying open port numbers on a host.
- 3. will log the detection and create an alert for a network administrator. It will not take action.
- 4. can have sophisticated security policies applied to the traffic passing through them. Can look deeper into the network traffic to block malicious behaviour.
- 5. is the process of converting information into a form in which unauthorized parties cannot read it.
- 8. (7,7,7) let's remote employees use a secure encrypted tunnel from their mobile computer and securely connect to the organization’s network. This systems can also securely interconnect branch offices with the central office network.
- 9. (6,11)is manipulating people into performing actions or divulging confidential information.
- 14. may prevent the loss of irreplaceable data.