Put closer less latency, put further away more security
What is device placement
the technology that enables secure, encrypted communication between two endpoints
What is a VPN?
a network system used to access and manage devices within a separate security zone
What is a jump server?
firewalls for web applications that protect their servers.
What are Web Application Firewalls
implementing multifactor authentication, role-based access control, and network segmentation to restrict access to sensitive data
What are access controls
We divide a network into these
What are security zones?
allows for a remote user to connect to an internal network using encrypted communications
What is remote access VPN
an intermediate point between the user and the service they are trying to access.
What is a proxy server
This firewall combines a bunch of techniques into one powerful tool.
What is a Next-generation firewall?
Deploy firewalls, intrusion detection/prevention systems (IDS/IPS), and secure protocols like TLS to protect your network perimeter.
What is network security
Offer fewer of these and your system is more secure
What are attack surfaces?
cryptographic protocol that secures communication between two endpoints
What is Transport Layer Security (TLS)
The majority of networking and security professionals have these and collectors placed in their network.
What are sensors
Similar to the NGFW, this is when multiple firewall tools are combined into one tool. These are stronger than a single tool being used by itself
What are Unified Threat Management(UTM)?
Use anti-virus and anti-malware software, endpoint detection and response (EDR) solutions, and data encryption to protect devices
What is endpoint security?
A device that is in line and can control the system.
What is an active device?
provides VPN between endpoints by encrypting every packet individually
What is IPSeC? (Internet protocol security)
identifies when an attack is occurring and then notify an end user.
What is an IDS
These firewalls operate on the transport layer inspecting and controlling data packets based on source and destination ports, protocols
What are layer 4 Firewalls?
Educate employees about cyber threats and best practices to minimize human error and phishing risks.
What is Security awareness and training
If it fails this way, the network still works
What is fail open?
flexible software overlay that sits on top of multiple WAN connections
What is Software-defined Wide Area Network (SD-WAN)/
identify when an attack is occurring and then stops it
What is intrusion protection system?
This are also known as “deep packet inspection” firewalls
What are layer 7 firewalls?
Developing a plan for identifying, containing, and mitigating security incidents to minimize damage and recovery time
What is incident response?