Network Security encompasses the policies, practices, and technologies designed to protect computer networks and their data from unauthorized access, misuse, modification, or denial of service attacks—operating across multiple layers from physical infrastructure through application level using defense-in-depth strategies. This discipline has evolved dramatically since early perimeter-based defenses to embrace Zero Trust principles, assuming breach and verifying every access attempt regardless of location, while modern threats like ransomware and AI-powered attacks demand continuous monitoring, behavioral analysis, and automated response capabilities. Understanding network security means recognizing that traditional castle-and-moat approaches are obsolete—attackers already inside networks move laterally for months undetected, making east-west traffic monitoring and micro-segmentation as critical as north-south perimeter controls for containing breaches before they become catastrophic.
What This Cheat Sheet Covers
This topic spans 17 focused tables and 111 indexed concepts. Below is a complete table-by-table outline of this topic, spanning foundational concepts through advanced details.
Table 1: Firewall Types
| Type | Example | Description |
|---|---|---|
Palo Alto PA-5400Cisco Firepower | • Combines stateful inspection with deep packet inspection, application awareness, intrusion prevention, and threat intelligence • inspects Layer 7 content and user identity. | |
iptables --state ESTABLISHED,RELATEDASA access-list | • Tracks connection state tables to remember active sessions • allows return traffic automatically without explicit rules • Layer 4 filtering. | |
iptables -A INPUT -s 10.0.0.0/8 -j DROPACL permit tcp any eq 443 | • Examines packet headers only—source/destination IP and ports • stateless operation evaluates each packet independently • fast but less secure. | |
AWS WAFCloudflare WAF | • Filters HTTP/HTTPS traffic to protect web apps • defends against OWASP Top 10 attacks including SQL injection, XSS, CSRF • operates at Layer 7. |