Proxy Servers + Web Filters + Intrusion Detection and Intrusion Prevention Systems

0.0(0)
studied byStudied by 0 people
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/5

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

6 Terms

1
New cards

Proxy servers

accept and forward requests, centralizing the requests and allowing actions to be taken on the requests and responses. Thye can filter or modify traffic and cache data, and since they centralize requests, they can be used to support access requirements by IP address or similar requirements

2
New cards

Forward proxies

are placed between clients and servers, and they accept requests from clients and send them forward to servers. Since forward proxies conceal the original client, they can anonymize traffic or provide access to resources that might be blocked by IP address or geographic location

3
New cards

Reverse proxies

are placed between servers and clients, and they are used to help with load balancing and caching of content. Clients can thus query a single system but have traffic load spread to multiple systems or sites

4
New cards

Web filters

sometimes called content filters, are centralized proxy devices or agent-based tools that allow or block traffic based on content creators

5
New cards

Signature-based

detections rely on a known hash or signature matching to detect a threat

6
New cards

Anomaly-based

detection establishes a baseline for an organization or network and then flags when out-of-the-ordinary behavior occurs