Created by Tyler Hampton
over 6 years ago
|
||
Question | Answer |
Firewall | A combination of hardware and software that protects a network from attack by hackers who could gain access through public network, including the Internet |
Router | A device that connects two or more networks and allows packets to be transmitted and received between them. A router determines the best path for data packets from source to destination. |
Switch | A network device that can replace a router or hub in a local network and get data from a source to a destination. Switching allows for higher speeds. |
Web Security Gateway | A proxy server with web protection software built-in. Depending on the vendor, the "web protection" can range from a standard virus scanner on incoming packets to monitoring outgoing user traffic for red flags as well. |
VPN Concentrator | A hardware device used to create remote access VPNs. The concentrator creates encrypted tunnel sessions between hosts, and many use two-factor authentication for additional security. |
Proxy Firewall | A proxy server that also acts as a firewall, blocking network access from external networks. |
Proxy Server | A type of server that makes a single Internet connection and services requests on behalf of many users. |
NIPS | Network Intrusion Prevention System. An intrusion prevention system that is network based. |
NIDS | Network Intrusion Detection System. An approach to an IDS, it attaches the system to a point in the network where it can monitor and report on all network traffic. |
HIDS | Host-Based Intrusion Detection System. An intrusion detection system that is host-based. An alternative is an intrusion detection system that is network-based. |
Protocol Analyzer | A software and hardware troubleshooting tool that is used to decode protocol information to try to determine the source of a network problem and to establish baselines. |
Spam Filter | Filters that try to eliminate unwanted, unsolicited email sent in bulk. |
WAF | Web Application Firewall. A firewall that can look at every request between a web client and a web server and identify possible attacks. |
Examples of Application Aware Devices | Firewalls, IPS, IDS, and Proxies. |
Want to create your own Flashcards for free with GoConqr? Learn more.