Network Security
Common Network Security Threats
Types of Viruses
Firewall
Email Security
100

This secure, encrypted connection over the internet allows remote users to safely access a private network.

VPN (Virtual Private Network)

100

This attack tricks users into revealing sensitive information by using fake emails, websites, or messages that appear legitimate.

Phishing


100

This type of malware is a self-replicating program that travels across networks by itself — without needing a host file or user intervention.

Worm

100

Firewalls are an essential part of network security and are commonly used in both _____ and ____ networks.

Home and Business

100

is the process of encoding an email (its contents and attachments) in such a way that only authorized recipients can read it.

Email encryption

200

This network security practice involves dividing a network into smaller sections to limit the spread of cyberattacks.

network segmentation

200

This threat includes viruses, worms, trojans, and ransomware, and is designed to damage, disrupt, or steal data from systems and networks.

Malware


200

this type of virus attaches itself to executable files and spreads when the infected program is run.

File infectors

200

According to the notes, this network security system monitors and controls incoming and outgoing network traffic based on predefined rules.

Firewall

200

a long, complex, and unique combination of characters  that protects an account by reducing the likelihood of unauthorized access.

strong passwords

300

This process protects data by converting it into an unreadable form that can only be accessed with a decryption key.

encryption

300

Occurs when attackers gain entry into systems without permission, often by exploiting weak passwords or software vulnerabilities.

Unauthorized Access

300

This variety of virus is embedded in automatically executing macro-code within applications like word-processors, spreadsheets or database apps.

Macro-Virus

300

This type of firewall cannot detect if the packet contains malicious payload; it only filters traffic based on addresses and ports.

Packet filtering

300

Prevents unwanted, unsolicited, or harmful emails from reaching the user’s inbox by automatically identifying and blocking spam messages

Spam Filters

400

This security device or software monitors incoming and outgoing traffic and allows or blocks data packets based on predefined rules.

Firewall

400

Attacks that flood a network or server with excessive traffic, causing it to crash or become unavailable to legitimate users.

Denial of Service (DoS) & Distributed DoS (DDoS) Attacks

400

According to the notes, this is a misleading program that appears harmless or useful but hides a destructive payload — yet it doesn’t replicate like a virus does.

Trojan House

400

A type of firewall that monitors and keeps track of the state of active network connections, inspecting both packet headers and the context of the connection, to decide whether to allow or block network traffic.

State-full Inspection

400

protection from deceptive or fraudulent emails that impersonate a legitimate sender — from tricking users into revealing sensitive information such as passwords or financial credentials.

Phishing Protection

500

This type of network security ensures that only authorized users can access certain data or resources, typically using authentication and authorization.

Access Control

500

This threat occurs when attackers break into systems without permission, commonly due to weak passwords or vulnerabilities.

unauthorized access

500

This virus infects key operating files located in a computer’s boot sector — so that it runs before the operating system fully loads.

 boot-sector virus

500

method used by firewalls that examines the contents of data packets and can block specific types of traffic based on the application that is generating the traffic.

Application layering filtering


500

additional layer of protection by requiring users to verify their identity using two or more different authentication factors, rather than relying on just a password.

Multi-Factor Authentication