Network Security Cheat Sheet
The core ideas of Network Security distilled into a single, scannable reference — perfect for review or quick lookup.
Quick Reference
Firewall
A network security device or software that monitors and filters incoming and outgoing network traffic based on predefined security rules. Firewalls establish a barrier between trusted internal networks and untrusted external networks such as the internet.
Intrusion Detection and Prevention Systems (IDS/IPS)
Security systems that monitor network traffic for suspicious activity. An IDS detects and alerts on potential threats, while an IPS can also take automated action to block or mitigate detected threats in real time.
Virtual Private Network (VPN)
A technology that creates an encrypted tunnel over a public network, allowing remote users to securely access a private network as if they were directly connected to it. VPNs protect data confidentiality and integrity during transmission.
CIA Triad
The three fundamental objectives of information security: Confidentiality ensures that data is accessible only to authorized parties, Integrity ensures that data is accurate and unaltered, and Availability ensures that systems and data are accessible when needed.
Zero Trust Architecture
A security model based on the principle of 'never trust, always verify.' It requires strict identity verification for every person and device attempting to access resources, regardless of whether they are inside or outside the network perimeter.
Network Segmentation
The practice of dividing a computer network into smaller subnetworks (segments or zones), each acting as its own smaller network. This limits the lateral movement of attackers and contains breaches to a smaller portion of the infrastructure.
Encryption
The process of converting plaintext data into an unreadable ciphertext format using cryptographic algorithms and keys. Only parties with the correct decryption key can restore the data to its original form, protecting it from unauthorized access.
Denial-of-Service (DoS) Attack
An attack that aims to make a network resource or service unavailable to its intended users by overwhelming it with a flood of illegitimate traffic or exploiting a vulnerability that causes the system to crash. A Distributed Denial-of-Service (DDoS) attack uses multiple compromised systems to amplify the assault.
Public Key Infrastructure (PKI)
A framework of roles, policies, hardware, software, and procedures used to create, manage, distribute, store, and revoke digital certificates. PKI enables secure electronic communication by binding public keys to the identities of entities through a Certificate Authority (CA).
Penetration Testing
An authorized, simulated cyberattack performed on a computer system or network to evaluate its security posture. Penetration testers use the same techniques as malicious hackers to identify vulnerabilities before real attackers can exploit them.
Key Terms at a Glance
Get study tips in your inbox
We'll send you evidence-based study strategies and new cheat sheets as they're published.
We'll notify you about updates. No spam, unsubscribe anytime.