1/14
These flashcards cover key vocabulary and concepts related to network security, including types of firewalls, proxy servers, and security measures employed in modern networks.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No analytics yet
Send a link to your students to track their progress
Network Security Appliances
Devices used to protect networks, such as firewalls, proxy servers, and intrusion detection systems.
Firewall
A system that controls incoming and outgoing network traffic based on predetermined security rules.
Stateful Firewall
A firewall that monitors the state of active connections and makes decisions based on the context of the traffic.
Stateless Firewall
A firewall that treats each packet in isolation, making filtering decisions based solely on predefined rules.
Proxy Server
A server that acts as an intermediary for requests from clients seeking resources from other servers.
Intrusion Detection System (IDS)
A system that monitors network traffic for suspicious activities and potential threats.
Intrusion Prevention System (IPS)
A system that detects and attempts to block identified threats in the network.
Virtual Private Network (VPN)
A technology that creates a secure connection over a less secure network, such as the Internet.
Access Control List (ACL)
A set of rules that govern the permissions or restrictions associated with digital assets.
Data Loss Prevention (DLP)
Security measures designed to prevent unauthorized access to sensitive information.
Deception Instruments
Tools used to divert potential attackers away from valuable assets.
Web Application Firewall (WAF)
A firewall that filters and monitors HTTP traffic to and from a web application.
Network Address Translation (NAT)
A technique that translates private IP addresses to a public IP address.
Unified Threat Management (UTM)
A comprehensive security solution combining multiple security features into one device.
Heuristic Monitoring
A method of detecting threats based on experience, rather than established signatures.