What is a Proxy?
PROXIES
A proxy is an intermediary server that acts as a gateway between a client and a server .
It forwards requests from the client to the server and sends the server’s responses back to the client.
Proxies serve various purposes, such as enhancing security, improving browsing performance, enabling anonymity, and bypassing restrictions.
They can operate at different layers of the OSI model, typically at the application layer.
What are the types of proxies and their uses?
PROXIES
Key aspects of a reverse proxy
PROXIES
Description
IDS / IPS
What are the key differences between IDS and IPS?
IDS / IPS
How does an Intrusion Detection System (IDS) work?
IDS / IPS
How does an Intrusion Prevention System (IPS) work?
IDS / IPS
What detection methods are used in IDS and IPS?
IDS / IPS
What is Endpoint Detection and Response (EDR)?
EDR/XDR
Endpoint Detection and Response (EDR) is a cybersecurity solution focused on monitoring, detecting, and responding to threats on individual devices or endpoints.
It collects and analyzes endpoint data in real time to identify suspicious activity and enables quick response to mitigate potential risks.
What are the key features of EDR?
EDR/XDR
What is Extended Detection and Response (XDR)?
EDR/XDR
Extended Detection and Response (XDR) is a security solution that integrates and correlates data from multiple security layers (e.g., endpoints, network, servers, cloud) to provide a unified view of threats.
It expands beyond EDR by covering a broader range of attack vectors and streamlining threat detection and response.
What are the key features of XDR?
EDR/XDR
What are the differences between EDR and XDR?
EDR/XDR
TCP/UDP
What is TCP (Transmission Control Protocol)?
What are common use cases for TCP?
TCP/UDP
TCP is a connection-oriented protocol that ensures reliable communication between devices over a network. It uses a handshake mechanism to establish a connection and guarantees data delivery in the correct order.
Key Features:
Use Cases
- Web Browsing: HTTP/HTTPS relies on TCP for reliable page loading.
- File Transfers: Protocols like FTP use TCP to ensure files arrive intact.
- Email: SMTP, IMAP, and POP3 use TCP for reliable message delivery.
- Remote Access: SSH and Telnet depend on TCP for secure and ordered communication.
What is UDP (User Datagram Protocol)?
What are common use cases for UDP?
TCP/UDP
UDP is a connectionless protocol that allows fast communication without guaranteeing reliability or delivery order. It sends data as independent packets (datagrams) without establishing a connection.
Key Features:
Use Cases UDP
- Streaming: Video (e.g., YouTube, Netflix) and audio (e.g., Spotify) streaming.
- Gaming: Multiplayer games use UDP for real-time responsiveness.
- VoIP: Applications like Skype or Zoom prioritize speed over reliability.
- DNS Queries: DNS uses UDP for quick resolution of domain names to IP addresses.
- Broadcasting: Sending data to multiple devices (e.g., live video feeds).
What are the differences between TCP and UDP?
TCP/UDP
What is a Firewall?
FIREWALLS
A firewall is a network security device or software that monitors and controls incoming and outgoing traffic based on predefined security rules.
Its primary purpose is to establish a barrier between a trusted internal network and untrusted external networks, such as the internet, to protect against unauthorized access and cyber threats.
What are the types of firewalls?
FIREWALLS
What are the primary functions of a firewall?
FIREWALLS
What makes a firewall “next-generation”?
FIREWALLS
What is a Domain Generation Algorithm (DGA)?
DOMAIN GENERATION ALGORITHMS (DGA)
A Domain Generation Algorithm (DGA) is a technique used by malware to generate a large number of domain names in a pseudo-random or algorithmic manner.
These domains are used to establish communication between the infected device and its Command-and-Control server, helping attackers evade detection and domain blacklisting.
Why do attackers use DGAs in malware?
DOMAIN GENERATION ALGORITHMS (DGA)
What are the indicators of DGA-generated domains?
DOMAIN GENERATION ALGORITHMS (DGA)
sdf23tr4d56g.comHow can DGA-based threats be mitigated?
DOMAIN GENERATION ALGORITHMS (DGA)