1
2
3
4
5
100

Definition:A server acting as an intermediary between the external and internal networks, screening all incoming and outgoing traffic.

Proxy Server

100

Definition:A firewall that can block designated types of traffic from entering a protected network based on application data contained within packets

Content Filtering Firewall

100

Definition:A firewall innovation that monitors and limits the traffic of specific applications, adapts to the class of users or user groups, and adapts to the context of various applications, users, and devices.

Layer 7 Firewall

100

Definition:A security technique that alerts the system of any changes made to files that shouldn’t change, such as operating system files.

FIMS

100

Definition:A type of intrusion prevention that runs on a single computer, such as a client or server, to intercept and help prevent attacks against that one host.

HIPS

200

Definition:A list of statements used by a router or other device to permit or deny the forwarding of traffic on a network based on one or more criteria.

Access Control List

200

Definition:A firewall that manages each incoming packet as a stand-alone entity without regard to currently active connections.

Stateless Firewall

200

Definition:A stand-alone device, an application, or a built-in feature running on a workstation, server, switch, router, or firewall. It monitors network traffic, generating alerts about suspicious activity.

Intrusion Detection System

200

Definition:A type of intrusion detection that protects an entire network and is situated at the edge of the network or in a network’s DMZ.

NIDS

200

Definition:Software that can be configured to evaluate data logs from IDS, IPS, firewalls, and proxy servers in order to detect significant events that require the attention of IT staff according to predefined rules.

SIEM

300

Definition:An ACL rule which ensures that any traffic the ACL does not explicitly permit is denied by default.

Implicit Deny

300

Definition:A command-line firewall utility for Linux systems.

Iptables

300

Definition:Identifiable patterns of code that are known to indicate specific vulnerabilities, exploits, or other undesirable traffic.

Signatures

300

Definition:A monitoring technique in which one port on a switch is configured to send a copy of all its traffic to a second port.

Port Mirroring

300

Definition:A message generated when a pre-defined event occurs, which is then logged by the system.

Alert

400

Definition:A firewall configured and positioned to protect an entire network.

Networked Based firewall

400

Definition:A security strategy that combines multiple layers of security appliances and technologies into a single safety net.

UTM

400

Definition:The process of regularly updating the signatures used to monitor a network’s traffic.

Signature Management 

400

Definition:A stand-alone device, an application, or a built-in feature running on a workstation, server, switch, router, or firewall that stands in-line between an attacker and the targeted network or host, and can prevent traffic from reaching that network or host.

IPS

400

Definition:A message sent to IT personnel via email, text, or some other method that is triggered by the occurrence of a predefined event.

Notification

500

Definition:A firewall that only protects the computer on which it’s installed.

Host Based Firewalls

500

Definition:A firewall innovation that monitors and limits the traffic of specific applications, adapts to the class of users or user groups, and adapts to the context of various applications, users, and devices.

NGFWs

500

Definition:A type of intrusion detection that runs on a single computer, such as a client or server, to alert about attacks against that one host.

HIDS

500

Definition:A type of intrusion prevention that protects an entire network and is situated at the edge of the network or in a network’s DMZ.

NIPS

500

Definition:A switching protocol defined by the IEEE standard 802.1D that functions at the Data Link layer and prevents traffic loops by artificially blocking the links that would complete a loo

Spanning Tree Protocol

M
e
n
u