5.2 Network Security Flashcards
Computer networks enable __________ ________ and are essential for many daily activities and devices. Network threats can come from attackers, __________, or ________.
resource sharing;
misconfigurations; outages
How can networks be protected? (two ways)
secure design (e.g. segmentation, choke points, redundancies) and implementing devices like firewalls and intrusion detection systems.
Network segmentation divides networks into _________, allowing traffic control between segments and localizing issues.
subnets;
It can boost performance and prevent unauthorized access to sensitive areas.
Network segmentation
Choke points are what? ( 3 things) _____________ in network design can help mitigate issues from failures or attacks.
Locations where network traffic can be inspected, filtered and controlled.
Redundancies
_____________ control traffic flow in and out of networks, typically placed at trust boundary points. They examine _______ ________ to allow or disallow traffic based on various factors.
Firewalls;
network packets
________ ________ _________s look at individual packet contents to allow/disallow based on source/destination addresses, port numbers, and protocols. This method can be vulnerable to _________________.
Packet filtering firewalls;
attacks spanning multiple packets.
What mechanism tracks traffic at a more granular level, monitoring connections over time. They can prevent some intentionally disruptive attack traffic.
Stateful packet inspection firewalls
Deep packet inspection firewalls can analyze ________________________, providing more intelligence but also raising____________________.
the actual content of network traffic;
privacy concerns.
Proxy servers are _________ _________ ________ that provide security and performance features. They can act as _________ _________and allow traffic logging.
APPLICATION-specific firewalls; choke points
________________________uses multiple firewall layers to separate devices from the rest of the network, allowing controlled public access while protecting internal systems.
A demilitarized zone (DMZ)
Intrusion detection systems (IDS) ______________, hosts or applications for unauthorized activity.
monitor networks;
What are the two types of Intrusion detection systems?
They can use signature-based or anomaly-based detection methods.
How does Signature-based IDS work?
compare traffic to known attack signatures. Good except when there is a new attacker whose name is not recognized.
How does anomaly-based IDS work?
Looks for deviations from normal traffic patterns. Can produce a large amount of false positives because during normal activity due to unusual amount of traffic.
Network IDS placement requires careful consideration to avoid ____________. Putting them behind other _____ devices can help ___________________________.
overload; filtering; reduce obviously unwanted traffic.
Host-based IDS monitor individual hosts for _________ _________ __________, looking at __________________, ____________, and other indicators of compromise.
signs of intrusion; system logs, file integrity,
Intrusion prevention systems (IPS) are similar to IDS but can do what?
Actively block or prevent detected intrusions, not just detect and alert.
__________ _____________ _______________ ___________verify that devices meet security requirements before allowing them to connect to the network.
Network Access Control (NAC) systems
Virtual Private Networks (VPNs) do what?
create encrypted tunnels for secure communication over untrusted networks like the Internet.
How can VPN be implemented?
VPNs can be implemented using various protocols like IPsec, SSL/TLS, or PPTP, each with different security characteristics.
Wireless networks face unique security challenges due to their _______ and ease of .
broadcast nature; interception
encryption for wireless networks is considered insecure and should not be used; ________ and __________ are recommended instead.
WEP; WPA or WPA
Secure protocols like ___________, ____________, ______________should be used instead of their insecure counterparts to protect data in transit.
HTTPS, SSH, and SFTP