Network Security and Threats

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/9

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 2:49 PM on 5/1/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

10 Terms

1
New cards

Firewall use

Used to prevent unauthorised access to a network.

2
New cards

What does a firewall consist of

two NICs between the user and the internet

3
New cards

How does a firewall work

The firewall passes the packets between the two NICs and compares them against a set of rules set by the firewall software.

4
New cards

What are the set of firewall rules called

Packet filters

5
New cards

What does packet filtering / static filtering do

limits network access in accordance with administrator rules and policies. Examines the source IP, destination IP and the protocols being used, as well as the ports being requested.

6
New cards

What happens when access is denied by a firewall

Packet can either be dropped or rejected

7
New cards

Difference between dropped packet and rejected packet

A rejected packet sends an alert to the sender to notify them of the error whereas a dropped packet will not

8
New cards

Proxy server

Acts as an intermediary, collecting and sending data on behalf of a user

9
New cards

Benefits of a proxy

Privacy of user protected, can cache frequently used website data making it faster to load, reduce overall web traffic, can be used by admins to prevent access to sensitive information at work or school

10
New cards

Encryption

Makes data unreadable if it is intercepted. Encrypted and decrypted using keys