4.5 Web Filtering

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/8

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

9 Terms

1
New cards

Content Filtering

Allows organizations to control what web content users can access by filtering data within web pages.

  • Often referred to as URL filtering or website category filtering

  • At home, similar tools are called parental controls

  • Can block or allow content based on specific rules

  • Restrict access to inappropriate or dangerous sites.

  • Sometimes helps prevent sensitive data from leaving the network

  • Some filters are specifically used to block known-malicious websites containing malware or viruses.

2
New cards

URL Scanning

A type of content filtering that allows or blocks websites based on their Uniform Resource Locator (URL).

  • Also known as a Uniform Resource Identifier (URI)

  • Can allow or block specific sites by adding them to an allow list or block list.

  • Often categorize URLs—such as auction, hacking, malware, or recreation—for easier management

  • Effective for controlling browser content, though users can access data through other means.

  • Commonly built into next-generation firewalls

3
New cards

Agent Based

Installed directly on users' devices, allowing URL filtering to occur regardless of the user’s location or network.

  • Function even when users are remote or traveling

  • Firewall-based filtering, which only works when traffic passes through a specific firewall

  • Are centrally managed

  • Each device must regularly receive updates to ensure it has the latest URL categories

4
New cards

Proxies

Acts as an intermediary between users and external networks, controlling the flow of web traffic.

  • Receives user requests and then makes those requests itself to the internet.

  • Evaluates the responses before forwarding content to the user’s device.

  • Allows more than just filtering of URLs—it can cache web pages to speed up repeat requests and provide access control, limiting internet access based on user identity or device IP address

5
New cards

Types of Proxies

  • An explicit proxy requires the client (such as a web browser) to be manually configured with the proxy’s IP address and port number. The application knows it must send requests through the proxy.

  • In contrast, a transparent proxy (also called an implicit proxy) intercepts network traffic automatically, without the client’s knowledge or configuration.

6
New cards

Forward Proxy

A proxy that we would install specifically for users to gain access to the internet.

  • Sometimes you’ll see it referenced as an internal proxy.

  • The user and the proxy are in the internal network of the organization.

7
New cards

Block Rules

Block access based on fully qualified domain names (FQDNs) or by website category.

  • You can create specific rules, such as allowing *.professormesser.com

  • Or use predefined categories like educational, gambling, or government.

  • Most filters support over 50 categories, enabling granular control.

  • For example, educational sites might be allowed, home and garden sites allowed but logged, and gambling sites completely blocked.

8
New cards

Reputation

Sites are rated as trustworthy, low risk, medium risk, suspicious, or high risk.

  • Filters can automatically scan and assign based on site content, but admins can also manually override these ratings.

  • You might block all high-risk sites while allowing trustworthy ones, giving you fine-tuned control over what users can access.

9
New cards

DNS Filtering

Blocks access to malicious or inappropriate content by intercepting DNS lookups

  • When a user requests a domain, checks if it’s on a blocklist.

  • If so, it withholds the IP or returns a safe default, preventing the connection

  • Helps stop malware from reaching command-and-control servers.