Firewall Prevention Flashcards
These are sources of information that provide real-time or updated data on current cybersecurity threats, vulnerabilities, and attack tactics. Threat intelligence feeds help organizations stay informed about potential threats and improve their security posture.
Threat Intelligence Feeds
This is a security technique that focuses on monitoring and analyzing the behavior of systems, networks, or users. It looks for unusual or malicious activities by comparing current behavior to established baselines.
Behavior-Based Analysis
_____________ is a security system that monitors network traffic for suspicious activities or patterns, while IPS takes action to prevent or block potential threats based on the detected anomalies.
IDS, IPS,
Intrusion Detection/Prevention System (IDS/IPS)
This involves the management and restriction of applications that can be run on a network or system to prevent unauthorized or risky software from being used.
Application Control
This refers to the examination of data packets or content to identify and filter out malicious or undesirable content, such as malware or inappropriate materials.
Content Inspection
This is the practice of dividing a network into smaller, isolated segments to enhance security. It limits lateral movement for attackers and contains potential breaches.
Network Segmentation
It involves verifying the identity of devices attempting to connect to a network or system and applying access controls based on device characteristics and user privileges.
Device Authentication and Access Control
_____________ is a security measure that validates ARP packets to prevent ARP spoofing attacks, which can lead to man-in-the-middle attacks.
ARP Inspection/Address Resolution Protocol (ARP) inspection
This access control technique permits or denies network access based on the Media Access Control (MAC) addresses of devices. It can be used to restrict network access to authorized devices.
MAC Address Filtering
_____________ limits and controls the devices that can connect to network switch ports, preventing unauthorized access and network attacks.
Port Security
These are predefined rules and policies that govern who can access specific resources, such as files, applications, or network segments, and what actions they can perform.
Access Control Policies
Firewalls enforce rules that determine which network traffic is allowed or denied based on predefined criteria, such as IP addresses, ports, and protocols.
Firewall Rules and Access Control
This involves incorporating threat intelligence data into security systems to improve the ability to detect and respond to emerging threats.
Threat Intelligence Integration
Scheduled assessments of systems, networks, and applications to identify vulnerabilities and assess overall security effectiveness.
Regular Security Audits and Scanning
_____________ enforces policies to ensure that only authorized and compliant devices can access a network. It often involves authentication, endpoint security checks, and policy enforcement.
Network Access Control (NAC)
_____________ keep track of the state of active connections and make decisions based on the context of the traffic, improving security by understanding the state of network sessions.
Stateful Firewall Rules
Filtering and inspecting traffic at the application layer of the OSI model, which allows for granular control over specific applications and services.
Application Layer Filtering
_____________ requires users to provide multiple forms of authentication (e.g., password, fingerprint, token) to access a system or application, enhancing security beyond just a password.
Multi-Factor Authentication (MFA)
It restricts the rate at which certain actions or requests can be made, which can help prevent denial-of-service attacks and control resource usage.
Rate Limiting
The process of scanning and filtering incoming and outgoing emails for spam, malware, and other threats to protect email communication.
Email Filtering
Blocking or allowing access to websites based on predefined URL categories or content to enforce security policies.
URL Filtering
Rules and settings that define how authentication is performed, including password complexity requirements, account lockout policies, and authentication methods.
Authentication Policies
A specialized firewall that focuses on protecting web applications by inspecting and filtering web traffic to block common web application attacks.
Web Application Firewall (WAF)
Monitoring and controlling both content and application usage on a network to enforce security policies and prevent unauthorized activities.
Content Filtering and Application Control
Using regular expressions to search for specific patterns or strings within data, which is useful for identifying and blocking malicious content.
Regular Expression (Regex) Pattern Matching
Analyzing HTTP headers and content to identify and block malicious or unauthorized web traffic.
HTTP Header and Content Inspection
Adhering to coding best practices and security guidelines to develop software and applications that are less vulnerable to exploits.
Secure Coding Practices
Monitoring and filtering Domain Name System (DNS) traffic to block malicious domains and prevent DNS-related attacks.
DNS Inspection and Filtering
Implementing security measures at the application layer to detect and prevent application-specific attacks and vulnerabilities.
Application Layer Threat Prevention
Combining sandboxing (isolated execution environments) with behavioral analysis to detect and analyze threats in a controlled environment.
Sandboxing and Behavioral Analysis
_____________ is a set of tools and processes designed to prevent sensitive data from being accessed, shared, or leaked without authorization. It involves monitoring, classifying, and protecting data throughout its lifecycle.
Data Loss Prevention (DLP)
_____________ is a suite of extensions to DNS that adds cryptographic security to prevent DNS spoofing and ensure the authenticity and integrity of DNS data.
DNS Security (DNSSEC)
This involves analyzing DNS traffic to identify and filter out malicious or unwanted domain requests, such as those associated with phishing or malware distribution.
DNS Filtering and Inspection
_____________ restricts access to certain websites or types of content, often based on predefined categories or keywords, to enforce security and compliance policies.
Content Filtering
This technique allows network administrators to define routing policies based on specific criteria, such as source IP address or application type, to control how network traffic is forwarded.
Policy-Based Routing
It refers to the integration of threat intelligence data into DNS security measures to enhance the detection and prevention of DNS-related threats.
DNS Threat Intelligence