NETWORK SECURITY | NETWORK SECURITY DEVICES | Load Balancers, proxies, and web security gateways

Descrição

1. Switches and Routers | 2. Firewalls | 3. Load Balancers, proxies, and web security gateways | 4. VPNs and VPN concentrators | 5. Network intrusion detection and prevention | 6. Protocol analyzers | 7. Unified threat management
Kimberly Stover
FlashCards por Kimberly Stover , atualizado more than 1 year ago
Kimberly Stover
Criado por Kimberly Stover quase 8 anos atrás
2
1

Resumo de Recurso

Questão Responda
What 3 devices play a hybrid role and serve as network devices and security controls Load balancers Proxies Web security gateways
List 3 basic web server configurations Assign IP address to web server on DMZ create DNS entry that ties the registered domain for the server to IP address of server (ex:www.myserver.com) When users type myserver.com, they connect to the web server located in the DMZ
A more efficient way to grow server capacity where several servers share the load Determines which server will answer each user request Load balancing
The ____ entry for the web domain doesn't point directly to a web server, but to the ____________. As demand increases, administrators can add more servers using a technique called __________. DNS load balancer auto scaling
what process is this? load balancer
3 load balancer security functions SSL certificate management URL filtering Web application security policy enforcement tasks such as limiting access to restricted portions of a site to certain IP address ranges
Servers that browse web sites on behalf of end users Prevent users from directly connecting to web sites Proxy servers
INFO: Normally when user connects to web site their system connects directly with web server; in proxy situation, the user connects to proxy server and proxy server connects to web server
3 proxy server benefits Anonymization Performance boosting Content filtering
Logs only contain the address of the proxy server Anonymization
The ________ stores copies of frequently requested pages and answer some user requests with those stored or cached copies reducing the demand for ___________ proxy server network bandwidth
Web security gateways 7 functions Sits between user and internet Scans request coming from user Scan responses coming from internet Filters out potential malicious attacks Performs more advance filtering than proxy servers Incorporate real time threat intelligence information Cutting edge anti-intrusion technology for added layer of protection

Semelhante

2.1 Business Influences and Associated Security Risks
DJ Perrone
Infosec Basics
bondarets
Types of Attacks
River L.
Information Security: Chapter 2
marcb176
Data-centric Security
Michael Mihalik
Threats
marnus.db
Information Security FULL WORK
Luis Mauricio Falla Guiulfo
Vocabulário de Geografia
Alessandra S.
PROCESSO DISCIPLINAR
GoConqr suporte .
Arte do Renascimento Séc.XV - XVI
paulaqueiroz
Mapas Mentais em Sala de Aula
Alice Sousa