Section 21.203 Web and DNS Filtering Flashcards
Objective 4.1 Given a scenario, you must be able to apply common security techniques to computing resources. Objective 4.5 Given a scenario, you must be able to modify enterprise capabilities to enhance security.
Web Filtering
Web filtering or content filtering is used to control or restrict the content users can access on the internet
■ Crucial for businesses, educational institutions, and parents to ensure safe and productive internet use
Different types of web filtering techniques
Agent-Based Web Filtering
Involves installing a samll piece of software known as an agent on each device
Monitors and enforces web usage policies
Effective for remote and mobile workers
Different types of web filtering techniques
Centralised Proxy
Uses a proxy server as an intermediary between an organizations end users and the Internet
● Evaluates and controls web requests based on policies
● If the request does not conform with the policies, the request is simply
blocked or denied
Different types of web filtering techniques
URL Scanning
Analyses website URLs to check for matches in a database of known
malicious websites
Different types of web filtering techniques
Content Categorisation
Classifies websites into categories (e.g., social media, adult content) and
blocks or allows categories based on policies
Different types of web filtering techniques
Block Rules
Specific guidelines set by organisations to prevent access to certain websites or categories, often used to address security threats
Different types of web filtering techniques
Reputation-Based Filtering
Blocks or allows websites based on a reputation score determined by
third-party services, considering factors like hosting malware or phishing
DNS Filtering
DNS filtering (Domain Name System filtering) blocks access to specific websites by preventing the translation of domain names to their IP addresses
■ Users’ devices request domain name translation from DNS servers; if the domain is on the block list, the server withholds the IP address to prevent access
■ Commonly used to enforce internet usage policies, block inappropriate content, and protect against malicious websites
■ Often employed by schools, universities, and organizations to ensure safe and educational internet usage