2.5 - Network Services Flashcards
Web Server
- Respond to browser requests
- Using standard web browsing protocols - HTTP/HTTPS
- Pages are built with HTML, HTML5
- Web pages are stored on the server
- Downloaded to the browser
- Static pages or built dynamically in real-time
File Server
• Centralized storage of documents, spreadsheets, videos, pictures, and any other files • Standard system of file management • SMB (Server Message Block), • Apple Filing Protocol (AFP), etc. • The front-end hides the protocol • Copy, delete, rename, etc.
Print Server
- Connect a printer to the network
- Provide printing services for all network devices
- May be software in a computer
- Computer is connected to the printer
- May be built-in to the printer
- Network adapter and software
- Uses standard printing protocols
- SMB (Server Message Block),
- IPP (Internet Printing Protocol),
- LPD (Line Printer Daemon)
DHCP Server
- Dynamic Host Configuration Protocol
- Automatic IP address configuration
- Very common service
- Available on most home routers
- Enterprise DHCP will be redundant
- Usually running on central servers
DNS Server
- Domain Name System
- Convert names to IP addresses
- And vice versa
- Distributed naming system
- The load is balanced across many different servers
- Usually managed by the ISP or enterprise IT department
- A critical resource
Proxy Server
- An intermediate server
- Client makes the request to the proxy
- The proxy performs the actual request
- The proxy provides results back to the client
- Useful features
- Access control, caching,
- URL filtering, content scanning
Mail Server
• Store your incoming mail • Send your outgoing mail • Usually managed by the ISP or the enterprise IT department • A complex set of requirements • Usually one of the most important services • 24 x 7 support
Authentication Server
- Login authentication to resources
- Centralized management
- Almost always an enterprise service
- Not required on a home network
- Usually a set of redundant servers
- Always available
- Extremely important service
SIEM
- Security Information and Event Management
- Logging of security events and information
- Security alerts
- Real-time information
- Log aggregation and long-term storage
- Usually includes advanced reporting features
- Data correlation
- Link diverse data types
- Forensic analysis
- Gather details after an event
Syslog
- Standard for message logging
- Diverse systems, consolidated log
- Usually a central logging receiver
- Integrated into the SIEM
- You’re going to need a lot of disk space
- No, more. More than that.
- WORM drive technology
- Write Once Read Many - DVD-R
- Protect important security logs
IDS and IPS
• Network-based Intrusion Detection System /
Intrusion Prevention System
• Intrusions
• Exploits against operating systems, applications, etc.
• Buffer overflows, cross-site scripting, other
vulnerabilities
• Detection vs. Prevention
• Detection – Alarm or alert
• Prevention – Stop it before it gets into the network
All-In-One Security Appliance
Next-generation firewall, Unified Threat
Management (UTM) / Web security gateway
• URL filter / Content inspection
• Malware inspection, spam filter, CSU/DSU, router, switch,
firewall, IDS/IPS, bandwidth shaper, VPN endpoint
Endpoint Management server
• Manage all devices from one pane of glass
• Software installations, driver installations, software
updates, security patches, remote troubleshooting
• Requires an agent on the device
• Server sends the commands
• Agent executes the commands
Legacy and embedded systems
• Legacy systems • Another expression for “really old” • May also be “really important” • Learning old things can be just as important as learning the new things • Embedded systems • Purpose-built device • Not usual to have direct access to the operating system • Alarm system, door security, timecard system