NETWORK SECURITY | NETWORK SECURITY DEVICES | Load Balancers, proxies, and web security gateways

Description

1. Switches and Routers | 2. Firewalls | 3. Load Balancers, proxies, and web security gateways | 4. VPNs and VPN concentrators | 5. Network intrusion detection and prevention | 6. Protocol analyzers | 7. Unified threat management
Kimberly Stover
Flashcards by Kimberly Stover , updated more than 1 year ago
Kimberly Stover
Created by Kimberly Stover about 7 years ago
1
1

Resource summary

Question Answer
What 3 devices play a hybrid role and serve as network devices and security controls Load balancers Proxies Web security gateways
List 3 basic web server configurations Assign IP address to web server on DMZ create DNS entry that ties the registered domain for the server to IP address of server (ex:www.myserver.com) When users type myserver.com, they connect to the web server located in the DMZ
A more efficient way to grow server capacity where several servers share the load Determines which server will answer each user request Load balancing
The ____ entry for the web domain doesn't point directly to a web server, but to the ____________. As demand increases, administrators can add more servers using a technique called __________. DNS load balancer auto scaling
what process is this? load balancer
3 load balancer security functions SSL certificate management URL filtering Web application security policy enforcement tasks such as limiting access to restricted portions of a site to certain IP address ranges
Servers that browse web sites on behalf of end users Prevent users from directly connecting to web sites Proxy servers
INFO: Normally when user connects to web site their system connects directly with web server; in proxy situation, the user connects to proxy server and proxy server connects to web server
3 proxy server benefits Anonymization Performance boosting Content filtering
Logs only contain the address of the proxy server Anonymization
The ________ stores copies of frequently requested pages and answer some user requests with those stored or cached copies reducing the demand for ___________ proxy server network bandwidth
Web security gateways 7 functions Sits between user and internet Scans request coming from user Scan responses coming from internet Filters out potential malicious attacks Performs more advance filtering than proxy servers Incorporate real time threat intelligence information Cutting edge anti-intrusion technology for added layer of protection
Show full summary Hide full summary

Similar

2.1 Business Influences and Associated Security Risks
DJ Perrone
Types of Attacks
River L.
Infosec Basics
bondarets
Information Security: Chapter 2
marcb176
Data-centric Security
Michael Mihalik
Threats
marnus.db
Information Security FULL WORK
Luis Mauricio Falla Guiulfo
Criminal Law
jesusreyes88
GCSE Biology - Homeostasis and Classification Flashcards
Beth Coiley
What are they doing?
Tamara Urzhumova
2PR101 1.test - 6. část
Nikola Truong