Cyber Defenses

Req 5a — Defense Technologies

5a.
Describe three technologies that are used to defend a computer or network, such as access controls, antivirus software, firewall, intrusion detection/prevention systems, and Virtual Private Network.

You have spent the last several requirements learning how attackers operate. Now it is time to switch sides and learn about the tools defenders use. Every technology described here exists as a direct response to the threats you studied — firewalls block unauthorized traffic, antivirus catches malware, and VPNs encrypt your connection on risky networks.

Firewalls

A firewall is a barrier between your computer (or network) and the outside world. It inspects incoming and outgoing network traffic and decides what to allow and what to block based on a set of rules.

Think of a firewall as a bouncer at a door. The bouncer has a list of who is allowed in and who is not. Legitimate traffic gets through; suspicious traffic gets turned away.

How it works:

Types of firewalls:

Most home networks use both — your router’s built-in firewall plus the software firewall on each device.

Antivirus and Anti-Malware Software

Antivirus software scans your computer for known malware and removes it. Modern antivirus programs do much more than catch viruses — they detect worms, Trojans, spyware, ransomware, and other threats you learned about in Req 4b.

How it works:

Intrusion Detection and Prevention Systems (IDS/IPS)

An Intrusion Detection System (IDS) monitors network traffic for signs of an attack and alerts administrators when it finds something suspicious. An Intrusion Prevention System (IPS) goes a step further — it detects the attack and automatically blocks it.

How they differ from firewalls:

IDS/IPS systems look for patterns that indicate attacks — repeated failed login attempts, unusual data transfers, or network scanning. They are critical for organizations but less common in home networks.

Virtual Private Network (VPN)

A VPN creates an encrypted tunnel between your device and a remote server. All your internet traffic flows through this tunnel, hiding it from anyone trying to snoop — including your internet service provider, hackers on public Wi-Fi (as discussed in Req 4c), and even the Wi-Fi network operator.

How it works:

  1. Your device connects to a VPN server (run by the VPN provider)
  2. All your internet traffic is encrypted before leaving your device
  3. The VPN server decrypts your traffic and forwards it to its destination
  4. Responses come back to the VPN server, are encrypted, and sent back to you

When to use a VPN:

Access Controls

Access controls determine who can access what resources on a system. This includes:

Access controls follow the principle of least privilege — every user should have the minimum access they need to do their job, and no more. Your school might give you access to Google Classroom but not the admin panel where teachers enter grades.

Choosing Your Three

Pick three of these technologies to discuss with your counselor. For each one, be ready to explain:

  1. What it does and how it works
  2. What threats it defends against
  3. Where you might encounter it in your own life
Technologies in Cybersecurity — CompTIA Future of Tech An overview of cybersecurity technologies with real-world applications and career connections.
Layered defense diagram showing Firewall, IDS/IPS, VPN, Antivirus, and Access Controls from outer to inner