Perimeter Security Flashcards
Security devices focused on the boundary between the LAN and the WAN
in your organization’s network
Perimeter Security
_____ screen traffic between two portions of a network
Firewalls
Inspects each packet passing through the firewall and accepts or rejects it
based on the rules
Packet Filtering
Filters traffic based upon the ports being utilized and type of connection
(TCP or UDP)
NAT Filtering
gateway conducts an in-depth inspection based upon the
application being used
Application Layer Gateway
Operates at the session layer and only inspects the traffic during the
establishment of the initial session over TCP or UDP
Circuit Level Gateway
Traffic is allowed to enter or leave the network because there is an ACL
rule that specifically allows it
Explicit Allow
Traffic is denied the ability to enter or leave the network because there is
an ACL rule that specifically denies it
Explicit Deny
Traffic is denied the ability to enter or leave the network because there is
no specific rule that allows it
Implicit Deny
Firewall installed to protect your server by inspecting traffic being sent to
a web application
Web Application Firewall
§ A device that acts as a middle man between a device and a remote server
Proxy Server
is used to secure a network by keeping its machines
anonymous during web browsing
IP Proxy
Attempts to serve client requests by delivering content from itself
without actually contacting the remote server
Caching Proxy
Used in organizations to prevent users from accessing prohibited
websites and other content
Internet Content Filter
A go-between device that scans for viruses, filters unwanted
content, and performs data loss prevention functions
Web Security Gateway
A single computer (or file, group of files, or IP range) that might be
attractive to an attacker
Honeypot
§ A group of computers, servers, or networks used to attract an attacker
Honeynet
Systems designed to protect data by conducting content inspection of
data being sent out of the network
§ Also called Information Leak Protection (ILP) or Extrusion Prevention
Systems (EPS)
Data Loss Prevention
§ Attempts to detect, log, and alert on malicious network activities
Network Intrusion Detection Systems(NIDS)
§ Attempts to remove, detain, or redirect malicious traffic
Network Intrusion Prevention System (NIPS)
Combination of network security devices and technologies to provide
more defense in depth within a single device
Unified Threat Management