Module 2 Flashcards
Network Protocols
A set of rules used by two or more devices on a network to describe the order of a delivery and the structure of the data
Transmission Control Protocol (TCP)
An internet communications protocol that allows two devices to form a connection and stream data
Address Resolution Protocol (ARP)
A network protocol used to determine the MAC address of the next router or device on the path
Hypertext Transfer Protocol Secure (HTTPS)
A network protocol that provides a secure method of communication between clients and website servers
Domain Name System (DNS)
A network protocol that translates internet domain names into IP addresses
Security Protocols
HTTPS
SSL/TLS
IEEE 802.11 (WiFi)
A set of standards that define communication for wireless LANs
WiFi Protected Access (WPA)
A wireless security protocol for devices to connect to the internet
Firewall
A network security device that monitors traffic to and from your network
Port Filtering
A firewall function that blocks or allows certain port numbers to limit unwanted communication
Cloud-based Firewalls
Software firewalls that are hosted by a cloud service provider
Stateful
A class of firewall that keeps track of information passing through it and proactively filters out threats
Stateless
A class of firewall that operates based on predefined rules and does not keep track of information from data packets
Benefits of Next Generation Firewalls (NGFWs)
Deep packet inspection
Intrusion protection
Threat intelligence
Virtual Private Network (VPN)
A network security service that changes public IP address and hides a virtual location so that you can keep your data private when you’re using a public network like the Internet
Encapsulation
A process performed by a VPN service that protects your data by wrapping sensitive data in other data packets.
Security Zone
A segment of a network that protects the internal network from the Internet
Network Segmentation
A security technique that divides the network into segments
Uncontrolled Zone
Any network outside of the organizations control
Controlled Zone
A subnet that protects the internal network from the uncontrolled zone
Areas in the Controlled Zone
Demilitarized zone (DMZ)
Internal network
Restricted zone
Proxy Server
A server that fulfills the requests of a client by forwarding them onto other servers
Forward Proxy Server
Regulates and restrict a person’s access to the Internet
Reverse Proxy Server
Regulates and restricts the Internets access to an internal server