Detection & Analysis
Network Things
VPNing
Firewalls
Pot Luck I
Pot Luck II
100

A device that detects attacks and raises alerts. It is installed on network devices, such as routers or firewalls, and monitors network traffic.

Network-Based Intrusion Detection System (NIDS):

100

A VPN protocol that lacks security features, such as encryption. However, this protocol can still be used for a secure VPN connection if it is combined with another protocol that provides encryption.

Layer 2 Tunneling Protocol (L2TP):

100

A private data network that creates secure connections, or "tunnels," over regular Internet lines

Virtual Private Network (VPN):

100

An appliance, server plugin, or filter that applies a set of rules to an HTTP conversation. Generally, these rules cover common attacks such as cross-site scripting (XSS) and SQL injection

Web Application Firewall (WAF)

100

A private electronic network that links a company with its suppliers and customers

Extranet:

100

The method to secure a network by limiting which devices are allowed to connect to a network based on a list of MAC addresses kept by the wireless access points.

Media access control (MAC) filtering:

200

A system that examines network traffic and automatically responds to computer intrusions.

network-based intrusion prevention system (NIPS):

200

Used by switches to share information with other switches that are participating in the Spanning-Tree Protocol

Bridge Protocol Data Unit (BPDU):

200

A VPN that allows the user to always stay connected instead of connecting and disconnecting from it.

Always-on VPN

200

A hardware- or software-based network security system that is able to detect and block sophisticated attacks by filtering network traffic dependent on the packet contents.

Next generation firewall

200

a network designed for the exclusive use of computer users within an organization that cannot be accessed by users outside the organization

Intranet:

200

a preventative measure. The primary purpose is to prevent unauthorized DHCP servers from operating on a network.

Dynamic host configuration protocol (DHCP) snooping

300

Detection mode that, instead of trying to match known variants to a database, will measure traffic patterns against the baseline. Also known as Anomaly-based.

Heuristic/behavioral-based detection:

300

comprehensive security management tool that combines multiple security tools, including firewalls, virtual private networks, intrusion detection systems, and web content filtering and anti-spam software

Unified Threat Management (UTM):

300

An encrypted connection used with VPN's that only encrypts traffic going to private IP addresses used in the private network.

Split Tunnel VPN

300

Inspects traffic leaving the inside network as it goes out to the Internet.

stateful firewall

300

Security design paradigm where any request (host-to-host or container-to-container) must be authenticated before being allowed.

Zero trust:

300

A method of preventing switching loop or bridge loop problems. Both STP and RSTP prevent switching loops.

Loop prevention

400

the process of identifying rare or unexpected items or events in a data set that do not conform to other items in the data set

Anomaly Detection

400

instances in a private subnet can connect to services outside your VPC but external services cannot initiate a connection with those instances.

Network address translation (NAT) gateway

400

all traffic goes through the encrypted tunnel while the user is connected to the VPN

Full Tunnel VPN

400

A flrewall that manages and maintains the connection state of a session using the filter and ensures that only authorized packets are permitted in sequence.

stateless firewall

400

Switch port security feature that disables the port if it receives BPDU notifications related to spanning tree. This is configured on access ports where there any BPDU frames are likely to be malicious.

Bridge Protocol Data Unit (BPDU) guard:

400

can include avoiding physical cable loops among switches, using spanning tree protocol (STP) on switches, and implementing port security.

Broadcast storm prevention

500

A software application or gateway that filters client requests for various types of internet content (web, FTP, IM, and so on).

Content/URL filter

500

Policies that control how much bandwidth a protocol, PC, user, VLAN, or IP address may use.

Quality of Service (QoS):

500

A user-to-LAN virtual private network connection used by remote users.

Remote Access VPN:

500

Also known as knowledge-based detection or misuse detection, the examination of system or network data in search of patterns that match known attack signatures.

Signature-based detection

500

A clearly defined list of permissions that specifies what actions an authenticated user may perform on a shared resource.

Access Control List (ACL):

500

also known as DMZ; commonly uses two firewalls; one betweenpublic network and DMZ; other resides between the DMZ and the private network

Screened subnet