System and Network Security Cheat Sheet
The core ideas of System and Network Security distilled into a single, scannable reference — perfect for review or quick lookup.
Quick Reference
Firewalls
A firewall is a network security device or software that monitors and controls incoming and outgoing network traffic based on predetermined security rules. Firewalls can be stateless (examining individual packets) or stateful (tracking connection states), and next-generation firewalls (NGFW) add deep packet inspection, application awareness, and integrated intrusion prevention.
Intrusion Detection and Prevention Systems (IDS/IPS)
IDS monitors network traffic or system activities for malicious behavior and generates alerts, while IPS takes active measures to block or prevent detected threats. Both can use signature-based detection (matching known attack patterns) or anomaly-based detection (identifying deviations from normal behavior). IDS is passive and observes; IPS is inline and can drop or modify malicious packets.
Virtual Private Networks (VPNs)
A VPN creates an encrypted tunnel between two endpoints over a public network, ensuring confidentiality, integrity, and authentication of the transmitted data. Common VPN protocols include IPsec, which operates at the network layer, and OpenVPN or WireGuard, which can operate at various layers. VPNs are used for secure remote access and site-to-site connectivity.
Network Segmentation
Network segmentation divides a larger network into smaller, isolated subnetworks (segments or zones) to limit the blast radius of a security breach and control traffic flow between segments. Common techniques include VLANs, subnetting, and creating demilitarized zones (DMZs). Micro-segmentation extends this concept to individual workloads in virtualized and cloud environments.
TLS/SSL Protocols
Transport Layer Security (TLS) and its predecessor Secure Sockets Layer (SSL) are cryptographic protocols that provide secure communication over a network. TLS uses a combination of asymmetric encryption for key exchange and symmetric encryption for bulk data transfer, along with digital certificates to authenticate server identity. TLS 1.3 is the current standard, offering improved security and performance over earlier versions.
Access Control
Access control is the process of granting or denying specific requests to obtain and use information and related processing services. Models include Discretionary Access Control (DAC), where resource owners set permissions; Mandatory Access Control (MAC), where a central authority enforces policies based on classifications; and Role-Based Access Control (RBAC), where permissions are assigned to roles rather than individual users.
Wireless Security (WPA3)
WPA3 (Wi-Fi Protected Access 3) is the latest wireless security standard, addressing vulnerabilities in WPA2. It uses Simultaneous Authentication of Equals (SAE), which replaces the Pre-Shared Key (PSK) exchange and provides protection against offline dictionary attacks. WPA3 also offers forward secrecy, ensuring that captured traffic cannot be decrypted later if the password is compromised.
Zero Trust Architecture
Zero trust is a security model based on the principle of 'never trust, always verify.' Unlike traditional perimeter-based security, zero trust assumes that threats exist both inside and outside the network and requires continuous verification of every user, device, and application before granting access. Key components include micro-segmentation, least-privilege access, multi-factor authentication, and continuous monitoring.
Defense in Depth
Defense in depth is a cybersecurity strategy that employs multiple layers of security controls throughout an information system. The idea is that if one layer fails, additional layers continue to provide protection. Layers typically include physical security, network security, host security, application security, and data security, along with policies, procedures, and user awareness training.
Key Terms at a Glance
Get study tips in your inbox
We'll send you evidence-based study strategies and new cheat sheets as they're published.
We'll notify you about updates. No spam, unsubscribe anytime.