Chapter 12- Perimeter Security Flashcards
Security devices focused on the boundry between then LAN and the WAN in your organization’s network.
Perimeter Security
Inspects each packet passing through the firewall and accepts or rejects it based on the rules.
Packet Filtering
Filters traffic based upon the ports being utilized and type of connection (TCP or UDP).
NAT Filtering
Operates at the session layer and only inspects the traffic during the establishment of the initial session over TCP or UDP.
Circuit-Level gateway
Traffic is allowed to ender or leave the network becasue there is an ACL rule that specifically allows it.
Explicit Allow
Traffic is denied the ability to enter or leave the network becasue there is an ACL rule that specifically denies it.
Explicit Deny
Traffic is denied the ability to enter or leave the network because there is no apecific rule that allows it.
Implicit Deny
Firewall installed to protect your server by inspecting traffic being sent to a web application.
Web Application Firewall
A device that acts as a middle man between a device and a remote server.
Proxy Server
Used to secure a network by keeping its machines anonymous during web browsing.
IP Proxy
Attempts to serve clinet requests by delivering content from itself without actually contacting the remote server.
Caching Proxy
Used in organizations to prevent users from accessing prohibited websites and other content.
Internet Content Filter
A go-between device that scans for viruses, filters unwanted content, and performs data loss prevention functions.
Web Security Gateway
A single computer (or file, group of files, or IP range) that might be attractive to an attacker.
Honeypot
A group of computers, severs, or networks used to attract an attacker.
Honeynet