A network of computers work in tandem to overflow an access point and prevent legitimate users from accessing a service.
DDoS
These help store and organize those individual DNS records.
Nameservers
This helps protect web applications by filtering and monitoring HTTP traffic between a web application and the Internet.
WAF or Web Application Firewall
The data file that makes SSL/TLS encryption possible, and they contain the website's public key and the website's identity, along with related information.
SSL certificate
A unique identifier assigned to a device or domain that connects to the Internet.
IP address
Credentials obtained from a data breach on one service are used to attempt to log in to another unrelated service.
Credential stuffing
These contain information that other browsers or services need to interact with, like your server's IP address.
DNS records
The top layer of the data processing that occurs just below the surface or behind the scenes of the software applications that users interact with.
Layer 7
The primary protocol used to send data between a web browser and a website.
HTTP
A set of rules, for routing and addressing packets of data so that they can travel across networks and arrive at the correct destination.
Protocols
An attempt to acquire users’ information by masquerading as a legitimate entity.
Phishing
A setup that allows a customer to maintain authoritative DNS outside of Cloudflare.
CNAME setup
The most expensive WAF option that requires storage and maintenance of physical equipment.
Network-based WAF (on-prem)
A widely adopted security protocol designed to facilitate privacy and data security for communications over the Internet.
Transport Layer Security or TLS
The traffic cops of the Internet, making sure that Internet traffic goes to the right networks.
Routers
Automated activity that uses Trojan viruses to attack computers' security systems.
Botnet attack
A synchronized backup for when the primary DNS server is unable to respond to queries
Secondary DNS
A server that sits in front of web servers and forwards client (e.g. web browser) requests to those web servers.
Reverse proxy
The process that kicks off a communication session that uses TLS encryption
TLS handshake
When your browser started to load this webpage, it likely first made a ____ to find out the Cloudflare website's IP address.
DNS query
An attack where a middleman impersonates each endpoint and is able to manipulate both victims.
Man in the middle
A record that answers DNS requests for subdomains you haven't already defined.
Wildcard DNS record
Solution to store configuration in their own source code repository, institute a change management process that includes code review, and be able to track their configuration versions and history over time.
Terraform
A method of encrypting data with two different keys and making one of the keys available for anyone to use
Public key encryption
A small segment of a larger message that contains both data and information about that data
a Packet