Network Security Operations
Study online at https://quizlet.com/_9c9knz
1. Firewalls hardware, software, or both designed to prevent unauthorized persons from
accessing electronic information.
2. Packet Filter Fire- operates at Layers 3 and 4 of the OSI network model: network and transport. These
walls firewalls inspect incoming (ingress) and outgoing (egress) traffic and compare the
following attributes to a database of packet filter rules that determine if the firewall
will forward (allow) or drop (deny) the traffic:
3. Stateful Inspec- Automatically creates rules to permit traffic based on communication type. Oper-
tion ates at OSI layer 3-5
4. Application Level Operates at OSI Layer 7 and below, Analyzes packet content and blocks pro-
gram-level traffic.
5. IDS (Intrusion De- Monitors the network to detect threats. Listens passively on the network. Alerts
tection System) network admin of any detected suspicious behavior.
6. IPS (Intrusion Intercepts and blocks threats. Has many network ports to operate as input/output
Prevention Sys- pairs. Has cables routed physically through devices to create choke points.
tem)
1/8
, Network Security Operations
Study online at https://quizlet.com/_9c9knz
7. IDS and IPS Both Identifies malicious traffic. Available as virtual and host-based applications.
Can be configured to operate in tap mode.
8. IDS Deployment Suspicious traffic comes into the switch Intrusion system inspects traffic and alerts
admin of suspicious packets. An alarm is sent to admin's management system.
9. IPS Deployment Suspicious traffic comes in. An intrusion system blocks suspicious packets before
it gets to the switch.
10. SQL Injection At- Security solution: Leverage a reverse proxy system and scan incoming packets for
tack malicious behavior. OSI Layer: Application (7)
11.
2/8
Study online at https://quizlet.com/_9c9knz
1. Firewalls hardware, software, or both designed to prevent unauthorized persons from
accessing electronic information.
2. Packet Filter Fire- operates at Layers 3 and 4 of the OSI network model: network and transport. These
walls firewalls inspect incoming (ingress) and outgoing (egress) traffic and compare the
following attributes to a database of packet filter rules that determine if the firewall
will forward (allow) or drop (deny) the traffic:
3. Stateful Inspec- Automatically creates rules to permit traffic based on communication type. Oper-
tion ates at OSI layer 3-5
4. Application Level Operates at OSI Layer 7 and below, Analyzes packet content and blocks pro-
gram-level traffic.
5. IDS (Intrusion De- Monitors the network to detect threats. Listens passively on the network. Alerts
tection System) network admin of any detected suspicious behavior.
6. IPS (Intrusion Intercepts and blocks threats. Has many network ports to operate as input/output
Prevention Sys- pairs. Has cables routed physically through devices to create choke points.
tem)
1/8
, Network Security Operations
Study online at https://quizlet.com/_9c9knz
7. IDS and IPS Both Identifies malicious traffic. Available as virtual and host-based applications.
Can be configured to operate in tap mode.
8. IDS Deployment Suspicious traffic comes into the switch Intrusion system inspects traffic and alerts
admin of suspicious packets. An alarm is sent to admin's management system.
9. IPS Deployment Suspicious traffic comes in. An intrusion system blocks suspicious packets before
it gets to the switch.
10. SQL Injection At- Security solution: Leverage a reverse proxy system and scan incoming packets for
tack malicious behavior. OSI Layer: Application (7)
11.
2/8