Lesson 2. Cybersecurity Fundamentals: Protecting Networks from Malicious Attacks

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/11

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

12 Terms

1
New cards

Firewall

Hardware or software that filters incoming and outgoing network traffic based on set rules, acting as the first line of defense against unauthorized intruders.

2
New cards

Packet Filter Firewall

A type of firewall that inspects data packets and decides whether to allow them to enter or leave a network based on predefined rules.

3
New cards

Application Filtering Firewall

A type of firewall that controls input, output, and access by applications or services, blocking applications, content, or specific words/phrases.

4
New cards

Stateful Firewall

A type of firewall that allows incoming requests only if they match an outgoing request, tracking established connections to filter traffic.

5
New cards

DMZ (Demilitarized Zone)

A network segment that separates public-facing services (e.g., web servers) from internal services (e.g., network), providing an additional layer of security.

6
New cards

Router

A network device that routes traffic within a network and forwards packets based on IP addresses.

7
New cards

Switch

A network device that facilitates packet delivery based on MAC addresses, learning and storing MAC addresses to improve network efficiency.

8
New cards

Load Balancer

A device that distributes network traffic across multiple servers to prevent overload and ensure efficient processing.

9
New cards

Proxy

A device or server that forwards packets between clients and servers, hiding internal IP addresses and providing security benefits.

10
New cards

NAT (Network Address Translation)

A method that remaps private IP addresses to public IP addresses, allowing multiple devices to share one public address and enhancing security.

11
New cards

Reverse Proxy

A proxy that protects a web server by inspecting incoming requests and blocking malicious traffic.

12
New cards

VPN Concentrator

A device that decrypts incoming packets from a Virtual Private Network (VPN) and encrypts outgoing packets, ensuring secure communication between remote users and the network.