Chapter 8 - Network Perimeter Security

12345678910111213141516171819202122232425
Across
  1. 4. A configuration file that tells browsers how to use a proxy server automatically.
  2. 6. Inspecting individual packets and allowing or blocking them based on rules.
  3. 9. A proxy that hides a user’s real IP address when accessing external networks.
  4. 10. Monitoring the state of active connections to make dynamic traffic decisions.
  5. 11. A tool that blocks access to unwanted or harmful online content.
  6. 13. A decoy system set up to attract and monitor attackers.
  7. 16. A device or software that monitors network traffic for suspicious activity.
  8. 19. A proxy that filters traffic based on specific application protocols.
  9. 20. A network interface mode that captures all traffic on the segment, not just addressed traffic.
  10. 21. An all-in-one security solution combining firewall, antivirus, intrusion prevention, and more.
  11. 22. A firewall that filters traffic based on specific application content or behavior.
  12. 23. A missed alert when actual malicious activity is not detected.
  13. 24. A rule that clearly grants permission for network access or traffic.
  14. 25. A rule that clearly blocks specific access or traffic.
Down
  1. 1. The boundary between a private internal network and the public internet.
  2. 2. An alert triggered by harmless activity mistaken as a threat.
  3. 3. A set of rules that control network traffic by permitting or denying data packets.
  4. 5. Technology that prevents sensitive data from being leaked or accessed without authorization.
  5. 7. A default rule that blocks traffic not explicitly allowed.
  6. 8. A firewall that manages traffic at the session layer between trusted and untrusted hosts.
  7. 12. A firewall specifically designed to protect web applications from attacks.
  8. 14. A proxy that filters and caches web traffic.
  9. 15. An appliance or software that filters malicious content and enforces web policies.
  10. 17. A system that actively blocks malicious traffic as it’s detected.
  11. 18. A network of honeypots designed to study and detect attacks.
  12. 20. A system that acts as an intermediary between users and the internet.