3.1 Flashcards

1
Q

Protocol

A

Allow different components from a computer to talk using using a commonly shared set of commands.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Domain Name System Security Extensions (DNSSEC)

A

DNSSEC is a set of extensions to the DNS protocol that enable origin authentication of DNS data, authenticated denial of existence, and data integrity. DNSSEC responses are authenticated but not encrypted so that unauthorized DNS responses won’t be interpreted as correct. Authenticated denial of existence allows a resolver to validate if a domain doesn’t exist.

UDP/TCP port 53.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Secure Shell (SSH)

A

Encrypted remote terminal program for servers. SSH uses asymmetric encryption but may also require an independent source of trust with a server.

TCP port 22

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Secure/Multipurpose Internet Mail Extensions (S/MIME)

A

While MIME sends binary data in plaintext via email, S/MIME uses a public key encryption for signing of MIME data in emails. It provides cryptography. It is built into a majority of modern email software today. It provides authentication, message integrity, and nonrepudiation in e-mails.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Secure Real-time Transport Protocol (SRTP)

A

Used to securely deliver audio and video over IP networks. SRTP provides encryption, message authentication and integrity, and replay protection to the RTP data.

Port 5004(UDP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Lightweight Directory Access Protocol over SSL (LDAPS)

A

LDAPS uses an SSL/TLS tunnel to connect LDAP services and transmit them securely.

LDAPS communication: TCP 636

LDAPS communication to a global server: TCP 3269

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

File Transfer Protocol, Secure (FTPS)

A

Implementation of FTP over an SSL/TLS secure channel. Only TLS is used for FTPS

Data connection port: TCP 989
Control connection port: TCP 990

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

SSH File Transfer Protocol (SFTP)

A

Use of FTP over an SSH channel. Leverages SSH to secure FTP transfers. SFTP uses TCP port 22.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Simple Network Management Protocol, Version 3 (SNMPv3)

A

An application-layer protocol that is a part of the IP suite of protocols and can be used to manage and monitor devices. These include network devices, computers, and other devices over an IP network.

Port 161/162.

If presented with a network device management scenario, remember the only secure version of SNMP is SNMPv3.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Hypertext Transfer Protocol over SSL/TLS (HTTPS)

A

The use of SSL/TLS (now mainly TLS) to encrypt a channel that HTTP traffic is transmitted. TLS replaced SSL because it was outdated and not as secure.

Uses port 443

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

IPSec

A

IPSec is a set of protocols that securely exchange packets at the network layer. The set of protocols are designed to provide access control, connectionless integrity, traffic-flow confidentiality, rejection of replayed packets, data security (encryption), and data origin authentication.
IPSec has two defined modes: transport and tunnel
IPSec has three modes of connection: host-to-server, server-to-server, and host-to-host.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Authentication Header (AH) / Encapsulated Security Payload (ESP)

A

To provide traffic security, AH and ESP have been defined for IP datagrams.
AH ensures the integrity of the data and also the authenticity of the data’s origins. AH protects the IP and this enables data origin authentication.
ESP provides security services for the higher-level protocol portion of the packet only.
AH protects integrity, but not privacy. ESP provides confidentiality, but no integrity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Tunnel/Transport

A

Transport mode encrypts only the data portion of the packet but not the source or destination IP addresses.

Tunnel mode provides encryption of source and destination IP addresses as well as the data itself. It can only be done between IPSec servers or routers because final destination needs to be known for delivery.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Post Office Protocol (POP) / Internet Message Access Protocol (IMAP)

A

110 for POP3
143 for IMAP

POP3S TCP port 995
IMAPS TCP port 993

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Voice and Video

A

Voice and video are frequently streaming media and, as such, have their own protocols for the encoding of the data streams. To securely transfer this material, you can use the Secure Real-time Transport Protocol (SRTP), which securely delivers audio and video over IP networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Time Synchronization

A

Network Time Protocol (NTP) is the standard for time synchronization across servers and clients. NTP is transmitted over UDP port 123. NTP has no assurance against a man-in-the-middle attack, and although this has raised concerns over the implications, to date, nothing has been done to secure NTP directly, or to engineer an out-of-band security check.

17
Q

E-mail and Web

A

Use of HTTPS is widespread and common. Keep in mind that SSL is no longer considered secure. E-mail is a bit more complicated to secure, and the best option is via S/MIME, also discussed previously in this chapter.

18
Q

E-mail and Web

A

Use of HTTPS is widespread and common. Keep in mind that SSL is no longer considered secure. E-mail is a bit more complicated to secure, and the best option is via S/MIME, also discussed previously in this chapter.

19
Q

File Transfer

A

Secure file transfer can be accomplished via a wide range of methods, ensuring the confidentiality and integrity of file transfers across networks. FTP is not secure, but as previously discussed, SFTP and FTPS are secure alternatives that can be used.

20
Q

Directory Services

A

Directory services use LDAP as the primary protocol. When security is required, LDAPS is a common option, as described previously. Directory services are frequently found behind the scenes with respect to logon information.

21
Q

Remote Access

A

Depending on the device being accessed, a variety of secure protocols exist. For networking equipment, such as routers and switches, SSH is the secure alternative to Telnet. For servers and other computer connections, access via VPN, or use of IPSec, is common.

22
Q

Domain Name Resolution

A

From an operational perspective, both TCP and UDP port 53 can be used for DNS, with the need of firewall protection between the Internet and TCP port 53 to prevent attackers from accessing zone transfers.

23
Q

Routing and Switching

A

SNMPv3 enables applications to manage data associated with networking and devices. Local access to the boxes may be accomplished by Telnet, although for security reasons SSH should be used instead.

24
Q

Network Address Allocation

A

Managing network address allocation functions in a network requires multiple decision criteria, including the reduction of complexity and the management of device names and locations.

SNMPv3 has many functions that can be employed to manage the data flows of this information to management applications that can assist administrators in network assignments.