Understanding Firewalls

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/24

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 3:18 AM on 3/30/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

25 Terms

1
New cards

Backdoor program

A program installed by hackers that allows them to take almost complete control of your computer without your knowledge

2
New cards

Black-hat hacker

Hackers who use their knowledge to destroy information or for illegal gain

3
New cards

White-hat hacker

A hacker who breaks into systems just for the challenge of it (and who don’t wish to steal or wreak havoc on the systems)

4
New cards

Botnet

A large group of software programs (called robots or bots) that runs autonomously on zombie computers

5
New cards

Zombie

A computer that a hacker controls; often used to launch denial-of-service (DoS/DDoS) attacks on other computers

6
New cards

Denial-of-Service (DoS) attack

An attack where legitimate users are denied access to a computer system because a hacker is repeatedly making requests on that computer system through a computer they have taken over as a zombie

7
New cards

Distributed Denial-of-Service (DDoS) attack

An attack launched from more than one zombie (sometimes thousands of zombies) at the same time and is more difficult to stop

8
New cards

Firewall

A program or hardware device designed to protect computers from hackers

9
New cards

Hacker

Anyone who unlawfully breaks into a computer system— either an individual computer or a network

10
New cards

Identity theft

Characterized by someone using personal information about you (such as your name, address, or SSN) to assume your identity for the purpose of defrauding others

11
New cards

Internet Protocol address (or IP address)

For the Internet to share information seamlessly, data packets must have a way of getting to their correct locations; a unique address every computer connected to the Internet has

12
New cards

Logical port blocking

The process where a firewall is configured to ignore all incoming packets that request access to port 21 (the port designated for FTP (file transfer protocol) traffic) thereby allowing no FTP requests to get through to the computer.

13
New cards

Logical ports

Digital pathways that allow computers to send and receive data for specific services, like FTP or web browsing

14
New cards

Network Address Translation (NAT)

NAT assigns internal IP addresses to devices on a network, keeping them safe from hackers by making them invisible outside the network.

15
New cards

Packet

Data travels through the Internet in small pieces, each called a packet. The packets are identified with an IP address, in part to help identify the computer to which they are being sent.

16
New cards

Packet filtering

The process where firewalls can be configured so that they filter out packets sent to specific logical ports

17
New cards

Packet sniffer

A computer program deployed by hackers that looks at (or sniffs) each packet as it travels on the Internet— not just those that are addressed to a particular computer, but all packets

18
New cards

Personal firewall

A firewall specifically designed for home networks

19
New cards

Script kiddies

Amateur hackers that use tools created by skilled hackers that enable unskilled novices to wreak the same havoc as professional hackers

20
New cards

Static addressing

When your IP address is always the same and is assigned by your ISP (internet service provider)

21
New cards

Trojan horse

A malware program that appears to be something useful or desirable (like a game or a screen saver), but while it runs it does something malicious in the background without your knowledge

22
New cards

What Risks Firewalls Protect Against

Even if you don’t store proprietary files on your home computer, hackers can still use it for other illegal activities, such as to commit identity theft, to launch a Trojan horse, to launch a denial-of-service attack, or to launch a distributed denial-of-service attack

23
New cards

How Firewalls Work

A firewall protects a computer by screening data coming into the computer’s logical ports. Logical ports allow a computer to organize requests for information from other networks or computers. Unless you take precautions to restrict access to your logical ports, hackers may be able to access your computer through them

24
New cards

Types of Firewalls

Firewalls can be either software programs or hardware devices, both of which are equally effective. Personal firewalls are software programs or hardware devices specifically designed to keep home computers safe from hackers

25
New cards

Installing and Testing Firewalls

Although some people prefer to have a professional install and test their firewall, even home users can install and test a firewall by following the instructions provided in the user manual. Unfortunately, not all firewalls come with software that allows you to test whether the firewall is working correctly. The best solution is to test the firewall with a testing agent such as ShieldsUP or LeakTest

Explore top flashcards

flashcards
Chemistryy
34
Updated 1208d ago
0.0(0)
flashcards
Social Studies Final Review
63
Updated 1043d ago
0.0(0)
flashcards
Chapter 24
69
Updated 1232d ago
0.0(0)
flashcards
US History Chapter 10 Test
32
Updated 106d ago
0.0(0)
flashcards
AP Lang Terms "B-H"
44
Updated 1200d ago
0.0(0)
flashcards
MAAN Quotes
22
Updated 1062d ago
0.0(0)
flashcards
Animal Quiz for Biology
29
Updated 1098d ago
0.0(0)
flashcards
Chemistryy
34
Updated 1208d ago
0.0(0)
flashcards
Social Studies Final Review
63
Updated 1043d ago
0.0(0)
flashcards
Chapter 24
69
Updated 1232d ago
0.0(0)
flashcards
US History Chapter 10 Test
32
Updated 106d ago
0.0(0)
flashcards
AP Lang Terms "B-H"
44
Updated 1200d ago
0.0(0)
flashcards
MAAN Quotes
22
Updated 1062d ago
0.0(0)
flashcards
Animal Quiz for Biology
29
Updated 1098d ago
0.0(0)