Chapter 19 - Protecting Your Network
Defined
1. Mantrap
2. Monlist
3. NAC
4. Network-Based anti-malware
5. Network-based firewall
6. Network Closet
7. Non-persistent agent
8. Ntpdc
9. OUI
10. Outbound traffic
11. PDos
12. Persistent agent
13. Phishing
14. Posture Assessment
15. Proximity Reader
16. Quarantine Network
17. Reddit Effect
18. Reflection
19. Cipher lock
20. Cleartext credential
21. Closed circuit television
22. Cloud
23. DZ
24. DOS
25. DHCP snooping
26. DDOS
27. DAC
28. DAI
29. Edge
30. Effective permission
31. External firewall
32. Fail close
33. Fail open
34. Fault tolerance
35. Firewall
36. Guest network
37. Hardening
38. Hardware Appliance
39. Honeynet
40. Honeypot
41. Host-Based Anti-Malware
42. Host-Based Firewall
43. Implicit Deny Any
44. Inbound Traffic
45. Inheritance
46. Internal Firewall
47. IP Camera
48. Key Fob
49. Keypad
50. Macro
51. Malicious Employee
52. Malicious User
53. Malware
54. Man-In-The-Middle
55. Reddit effect
56. Quarantine network
57. Proximity reader
58. Posture assessment
59. Pashing
60. Persistent agent
61. Permanent dos
62. Outbound traffic
63. OUI
64. Ntpdc
65. Non-persistent agent
66. Network closet
67.Network based firewall
68. Anti-malware
69. Nac
70. Mon list
71. Mantrap
72. Reflection
73. Threat
74. TEMPEST
75. Tail gating
76. Stateless inspection
77. Stateful inspection
78. Spyware
79. Spoofing
80. Reflection
81. RF emanation
82. Rootkit
83. Security Guard
84. Services
85. Session Hijacking
86. Signature
87. Slash dotting
88. Social Engineering
89. SOHO firewall
90. Smurf attack
91. Traffic spike
92. Trojan horse
93. Trusted user
94. Unencrypted user
95. Unified Threat Management (UTM)
96. Untrusted user
97. Video monitoring
98. Virus
99. Virus shield
100. VLAN hopping
101. Vulnerability
102. Worm
103. Zero-day attack
104. zombie