Lecture 8b Flashcards
(74 cards)
What is the purpose of security appliances?
They directly address security and work with networking device security features for layered security
Name some common security appliances.
Firewalls Proxy servers Deception instruments Intrusion detection and prevention systems Network hardware security modules
How does a firewall examine network traffic?
Uses bidirectional inspection to examine outgoing and incoming packets
What are rule-based firewalls?
Firewalls that act based on specific predefined criteria or rules
What is a policy-based firewall?
A firewall that uses generic policies rather than specific rules for more flexibility
Can firewalls filter content or URLs?
Yes firewalls can apply content and URL filtering
What is a rule-based firewall?
Uses specific predefined rules to allow or block traffic based on packet attributes
What does a policy-based firewall use for traffic filtering?
Uses high-level policies like user roles or applications for more flexible filtering
How does a stateless firewall operate?
Evaluates each packet independently without considering previous traffic
What is the function of a stateful firewall?
Tracks active connections and makes decisions based on traffic state and context
What is a hardware firewall?
A physical device dedicated to filtering traffic and protecting a network
What is a software firewall?
A program installed on a device to monitor and control incoming and outgoing traffic
What is a virtual firewall?
A software firewall deployed in virtual environments to secure virtual machines or cloud networks
What is a forward proxy?
A device that intercepts user requests from an internal network and processes them on behalf of the user
What is a reverse proxy?
Routes requests from an external network to the correct internal server
How does a proxy server protect internal endpoints?
By hiding their IP addresses and intercepting malware before it reaches them
What is the purpose of deception instruments in security?
To redirect threat actors away from valuable assets using honeypots and sinkholes
What is a honeypot?
A computer with limited security used as bait to lure and study attackers
What are two goals of using honeypots?
Deflect attackers to decoys and discover attacker behaviors and tools
What is a sinkhole in network security?
A device designed to redirect unwanted traffic to deceive attackers into thinking their attack succeeded
What is the difference between IDS and IPS?
IDS detects attacks IPS attempts to block attacks
How does an inline IDS/IPS system work?
Connected directly to the network and monitors data flow
How does a passive IDS system work?
Connected to a switch port receiving a copy of network traffic