1/5
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Proxy servers
accept and forward requests, centralizing the requests and allowing actions to be taken on the requests and responses. Thye can filter or modify traffic and cache data, and since they centralize requests, they can be used to support access requirements by IP address or similar requirements
Forward proxies
are placed between clients and servers, and they accept requests from clients and send them forward to servers. Since forward proxies conceal the original client, they can anonymize traffic or provide access to resources that might be blocked by IP address or geographic location
Reverse proxies
are placed between servers and clients, and they are used to help with load balancing and caching of content. Clients can thus query a single system but have traffic load spread to multiple systems or sites
Web filters
sometimes called content filters, are centralized proxy devices or agent-based tools that allow or block traffic based on content creators
Signature-based
detections rely on a known hash or signature matching to detect a threat
Anomaly-based
detection establishes a baseline for an organization or network and then flags when out-of-the-ordinary behavior occurs