Fundamentals of Firewalls

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/40

flashcard set

Earn XP

Description and Tags

These flashcards cover key vocabulary and concepts related to the fundamentals of firewalls, essential for understanding network defense and countermeasures.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

41 Terms

1
New cards

Firewall

A barrier between the world and your network, used to secure and control access.

2
New cards

Packet Filtering

A type of firewall that controls access by monitoring incoming and outgoing packets based on source/destination IP addresses and ports.

3
New cards

Stateful Packet Filtering

A firewall method that keeps track of active connections and monitors traffic based on the state of those connections.

4
New cards

Circuit Level Gateway

A virtual circuit between a proxy server and internal client that checks sessions without inspecting actual data.

5
New cards

Application Gateway

A firewall that examines connections between client and server applications, allowing for application-level authentication.

6
New cards

Host-Based Firewall

A software solution that runs on a host system to provide a firewall service.

7
New cards

Router-Based Firewall

A firewall placed between segments of a network, often the first line of defense, utilizing packet filtering.

8
New cards

Next-Generation Firewall (NGFW)

A firewall that combines packet inspection and stateful inspection methods with additional security features.

9
New cards

SYN Flood Attack

A type of denial-of-service attack that exploits the TCP handshake, aiming to overwhelm network resources.

10
New cards

Ping Flood Attack

A denial-of-service attack where the attacker sends a large number of ICMP Echo Request packets to target systems.

11
New cards

Deep Packet Inspection (DPI)

An advanced method of inspecting and filtering data packets transmitted over the Internet.

12
New cards

Demilitarized Zone (DMZ)

A physical or logical subnetwork that contains and exposes external-facing services to an untrusted network.

13
New cards

Dual-Homed Host

A firewall configuration that adds an additional interface to a host, providing extra security between networks.

14
New cards

Bastion Host

A heavily fortified computer designed to withstand attacks and provide a secure gateway into the network.

15
New cards

Network Address Translation (NAT)

A method of remapping IP address spaces by modifying network address information in IP packet headers while in transit.

16
New cards

TCP (Transmission Control Protocol)

A core protocol of the Internet Protocol Suite, responsible for ensuring reliable communication between network devices.

17
New cards

Application Layer Gateway

Also known as an application proxy; it inspects and controls incoming and outgoing traffic at the application layer.

18
New cards

Transport Layer Security (TLS)

Cryptographic protocol designed to provide communications security over a computer network.

19
New cards

Intrusion Detection System (IDS)

A device or software application that monitors a network or systems for malicious activity or policy violations.

20
New cards

Packet Header

The part of a packet that contains metadata such as IP addresses, port numbers, and protocols.

21
New cards

Port

A virtual endpoint for sending and receiving data packets, identified by a number and used to establish communication channels.

22
New cards

User Authentication

The process of verifying the identity of a user who is attempting to access a firewall or network.

23
New cards

Filtering Rules

Criteria set on a firewall to determine which network traffic should be allowed or blocked.

24
New cards

Malware Filtering

The process of detecting and preventing malware from entering the network.

25
New cards

Stateful Inspection

A firewall capability to track the state of active connections and make decisions based on the state and context of traffic.

26
New cards

Spoofing

The act of disguising communication from an unknown source as being from a known, trusted source.

27
New cards

Access Control List (ACL)

A set of rules that define what traffic is allowed or denied within a network.

28
New cards

Security Policy

A defined set of procedures to protect a network and its assets from security threats.

29
New cards

Network Security

The practice of safeguarding a computer network from intruders, whether targeted attackers or opportunistic malware.

30
New cards

Firewall Administration

Management and configuration of firewall rules and settings to ensure optimal performance and security.

31
New cards

Virtual Private Network (VPN)

A technology that creates a secure connection over a less secure network, such as the Internet.

32
New cards

Internet Protocol (IP)

The principal communications protocol for relaying datagrams across network boundaries.

33
New cards

Intrusion Prevention System (IPS)

A network security appliance that monitors network or system activities for malicious activities or policy violations.

34
New cards

Scalability

The capability of a network to handle growth, particularly in terms of traffic and number of users.

35
New cards

Configuration Management

The process of systematically managing changes to a system in a way that maintains integrity over time.

36
New cards

User Education

Training given to users to help them understand security risks and proper practices to avoid threats.

37
New cards

Logging and Monitoring

The practice of recording and overseeing events occurring in a network to detect irregularities and potential threats.

38
New cards

Implementation Plan

A detailed proposal for a firewall's deployment, including its setup and operational procedures.

39
New cards

Firewall Evaluation

The process of assessing different firewall solutions to determine their suitability for specific security needs.

40
New cards

Security Risk Assessment

The process of identifying, analyzing, and evaluating risks to a network's security.

41
New cards

Protocol Standards

Agreed-upon specifications for data communication, defining the rules for data exchange.