Attack!!!
Call me by my nameserver
You're Fire(wall)d!
Securely Socket to me
The Net
100

A network of computers work in tandem to overflow an access point and prevent legitimate users from accessing a service.

DDoS

100

These help store and organize those individual DNS records.

Nameservers

100

This helps protect web applications by filtering and monitoring HTTP traffic between a web application and the Internet.

WAF or Web Application Firewall

100

The data file that makes SSL/TLS encryption possible, and they contain the website's public key and the website's identity, along with related information.

SSL certificate

100

A unique identifier assigned to a device or domain that connects to the Internet.

IP address

200

Credentials obtained from a data breach on one service are used to attempt to log in to another unrelated service.

Credential stuffing

200

These contain information that other browsers or services need to interact with, like your server's IP address.

DNS records

200

The top layer of the data processing that occurs just below the surface or behind the scenes of the software applications that users interact with.

Layer 7

200

The primary protocol used to send data between a web browser and a website.

HTTP

200

A set of rules, for routing and addressing packets of data so that they can travel across networks and arrive at the correct destination.

Protocols

300

An attempt to acquire users’ information by masquerading as a legitimate entity.

Phishing

300

A setup that allows a customer to maintain authoritative DNS outside of Cloudflare.

CNAME setup

300

The most expensive WAF option that requires storage and maintenance of physical equipment.

Network-based WAF (on-prem)

300

A widely adopted security protocol designed to facilitate privacy and data security for communications over the Internet.

Transport Layer Security or TLS

300

The traffic cops of the Internet, making sure that Internet traffic goes to the right networks.

Routers

400

Automated activity that uses Trojan viruses to attack computers' security systems.

Botnet attack

400

A synchronized backup for when the primary DNS server is unable to respond to queries

Secondary DNS

400

A server that sits in front of web servers and forwards client (e.g. web browser) requests to those web servers.

Reverse proxy

400

The process that kicks off a communication session that uses TLS encryption

TLS handshake

400

When your browser started to load this webpage, it likely first made a ____ to find out the Cloudflare website's IP address.

DNS query

500

An attack where a middleman impersonates each endpoint and is able to manipulate both victims.

Man in the middle

500

 A record that answers DNS requests for subdomains you haven't already defined.

Wildcard DNS record

500

Solution to store configuration in their own source code repository, institute a change management process that includes code review, and be able to track their configuration versions and history over time.

Terraform

500

A method of encrypting data with two different keys and making one of the keys available for anyone to use

Public key encryption

500

A small segment of a larger message that contains both data and information about that data

a Packet

M
e
n
u