Firewall Prevention Flashcards
These are sources of information that provide real-time or updated data on current cybersecurity threats, vulnerabilities, and attack tactics. Threat intelligence feeds help organizations stay informed about potential threats and improve their security posture.
Threat Intelligence Feeds
This is a security technique that focuses on monitoring and analyzing the behavior of systems, networks, or users. It looks for unusual or malicious activities by comparing current behavior to established baselines.
Behavior-Based Analysis
_____________ is a security system that monitors network traffic for suspicious activities or patterns, while IPS takes action to prevent or block potential threats based on the detected anomalies.
IDS, IPS,
Intrusion Detection/Prevention System (IDS/IPS)
This involves the management and restriction of applications that can be run on a network or system to prevent unauthorized or risky software from being used.
Application Control
This refers to the examination of data packets or content to identify and filter out malicious or undesirable content, such as malware or inappropriate materials.
Content Inspection
This is the practice of dividing a network into smaller, isolated segments to enhance security. It limits lateral movement for attackers and contains potential breaches.
Network Segmentation
It involves verifying the identity of devices attempting to connect to a network or system and applying access controls based on device characteristics and user privileges.
Device Authentication and Access Control
_____________ is a security measure that validates ARP packets to prevent ARP spoofing attacks, which can lead to man-in-the-middle attacks.
ARP Inspection/Address Resolution Protocol (ARP) inspection
This access control technique permits or denies network access based on the Media Access Control (MAC) addresses of devices. It can be used to restrict network access to authorized devices.
MAC Address Filtering
_____________ limits and controls the devices that can connect to network switch ports, preventing unauthorized access and network attacks.
Port Security
These are predefined rules and policies that govern who can access specific resources, such as files, applications, or network segments, and what actions they can perform.
Access Control Policies
Firewalls enforce rules that determine which network traffic is allowed or denied based on predefined criteria, such as IP addresses, ports, and protocols.
Firewall Rules and Access Control
This involves incorporating threat intelligence data into security systems to improve the ability to detect and respond to emerging threats.
Threat Intelligence Integration
Scheduled assessments of systems, networks, and applications to identify vulnerabilities and assess overall security effectiveness.
Regular Security Audits and Scanning
_____________ enforces policies to ensure that only authorized and compliant devices can access a network. It often involves authentication, endpoint security checks, and policy enforcement.
Network Access Control (NAC)
_____________ keep track of the state of active connections and make decisions based on the context of the traffic, improving security by understanding the state of network sessions.
Stateful Firewall Rules
Filtering and inspecting traffic at the application layer of the OSI model, which allows for granular control over specific applications and services.
Application Layer Filtering
_____________ requires users to provide multiple forms of authentication (e.g., password, fingerprint, token) to access a system or application, enhancing security beyond just a password.
Multi-Factor Authentication (MFA)
It restricts the rate at which certain actions or requests can be made, which can help prevent denial-of-service attacks and control resource usage.
Rate Limiting
The process of scanning and filtering incoming and outgoing emails for spam, malware, and other threats to protect email communication.
Email Filtering
Blocking or allowing access to websites based on predefined URL categories or content to enforce security policies.
URL Filtering
Rules and settings that define how authentication is performed, including password complexity requirements, account lockout policies, and authentication methods.
Authentication Policies
A specialized firewall that focuses on protecting web applications by inspecting and filtering web traffic to block common web application attacks.
Web Application Firewall (WAF)
Monitoring and controlling both content and application usage on a network to enforce security policies and prevent unauthorized activities.
Content Filtering and Application Control