This secure, encrypted connection over the internet allows remote users to safely access a private network.
VPN (Virtual Private Network)
This attack tricks users into revealing sensitive information by using fake emails, websites, or messages that appear legitimate.
Phishing
This type of malware is a self-replicating program that travels across networks by itself — without needing a host file or user intervention.
Worm
Firewalls are an essential part of network security and are commonly used in both _____ and ____ networks.
Home and Business
is the process of encoding an email (its contents and attachments) in such a way that only authorized recipients can read it.
Email encryption
This network security practice involves dividing a network into smaller sections to limit the spread of cyberattacks.
network segmentation
This threat includes viruses, worms, trojans, and ransomware, and is designed to damage, disrupt, or steal data from systems and networks.
Malware
this type of virus attaches itself to executable files and spreads when the infected program is run.
File infectors
According to the notes, this network security system monitors and controls incoming and outgoing network traffic based on predefined rules.
Firewall
a long, complex, and unique combination of characters that protects an account by reducing the likelihood of unauthorized access.
strong passwords
This process protects data by converting it into an unreadable form that can only be accessed with a decryption key.
encryption
Occurs when attackers gain entry into systems without permission, often by exploiting weak passwords or software vulnerabilities.
Unauthorized Access
This variety of virus is embedded in automatically executing macro-code within applications like word-processors, spreadsheets or database apps.
Macro-Virus
This type of firewall cannot detect if the packet contains malicious payload; it only filters traffic based on addresses and ports.
Packet filtering
Prevents unwanted, unsolicited, or harmful emails from reaching the user’s inbox by automatically identifying and blocking spam messages
Spam Filters
This security device or software monitors incoming and outgoing traffic and allows or blocks data packets based on predefined rules.
Firewall
Attacks that flood a network or server with excessive traffic, causing it to crash or become unavailable to legitimate users.
Denial of Service (DoS) & Distributed DoS (DDoS) Attacks
According to the notes, this is a misleading program that appears harmless or useful but hides a destructive payload — yet it doesn’t replicate like a virus does.
Trojan House
A type of firewall that monitors and keeps track of the state of active network connections, inspecting both packet headers and the context of the connection, to decide whether to allow or block network traffic.
State-full Inspection
protection from deceptive or fraudulent emails that impersonate a legitimate sender — from tricking users into revealing sensitive information such as passwords or financial credentials.
Phishing Protection
This type of network security ensures that only authorized users can access certain data or resources, typically using authentication and authorization.
Access Control
This threat occurs when attackers break into systems without permission, commonly due to weak passwords or vulnerabilities.
unauthorized access
This virus infects key operating files located in a computer’s boot sector — so that it runs before the operating system fully loads.
boot-sector virus
method used by firewalls that examines the contents of data packets and can block specific types of traffic based on the application that is generating the traffic.
Application layering filtering
additional layer of protection by requiring users to verify their identity using two or more different authentication factors, rather than relying on just a password.
Multi-Factor Authentication