Ch 6 - Security Technology-Firewalls and VPNs Flashcards

1
Q

Story Time

Beg. Chapter

A

Kelvin Urich - scheduled to present a plan to Charlie Moody and the IT planning staff in 2 weeks on the Internet connection architecture

W/O this they cannot start costing the project or planning for deployment

Laverne Nguyen (architecture team) - No consensus on 2 design alternatives presented by the consultant:

  1. Screened subnet with bastion hosts
  2. Screened subnet with proxy servers

Miller Harrison (contractor brought in to help with the project) - seems to be in disagreement and pouting.

Ends with Kelvin calling for a meeting the next day with the consultant to make the decision

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Learning Objectives

A
  1. Recognize the important role of access control in computerized information systems, and identify and discuss commonly used authentication factors
  2. Describe firewall technology and the various approaches to its implementation
  3. Identify the various approaches to control remote and dial-up access by means of the authentication and authorization of users
  4. Discuss content filtering technology
  5. Describe the technology that enables the use of VPNs (virtual private networks).
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Access Control

A

is the method by which systems determine whether and how to admit a user into a trusted area of the organization.

Restricted areas could be: computer room

How is access control achieved? via a combination of policies, programs, and technologies

ACs can be: mandatory, non-discretionary or discretionary

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Mandatory access controls (MACs)

A

use data classification schemes, giving users and data owners limited controls over access to information resources.

How does a data classification scheme work?

Information is rated by sensitivity and each user is assigned the level of information that they may access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Lattice-based access control

A

a form of access control where users are assigned a matrix of authorizations for particular areas of access.

It relies on:

Access Control List (ACL) - column of attributes of a particular object (i.e. printer)

Capabilities Table - a row of attributes associated with a particular subject

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Nondiscretionary Controls

A

strictly enforced version of MACs that are managed by a central authority in the organization.

Can be role-based controls or task-based controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Discretionary access controls (DACs)

A

implemented at the discretion or option of the data user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Authentication

A

process of validating a supplicant’s purported identity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

3 Widely used authentication mechanisms/factors:

A
  1. Something the supplicant knows
  2. Something a supplicant has
  3. Something a supplicant is
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Something a supplicant knows?

A
  1. password
  2. passphrase
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Something a supplicant has?

A
  1. dumb cards - atm
  2. smart cards
  3. synchronous tokens
  4. asynchronous tokens
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Something a supplicant is or can produce

A
  1. Fingerprints, palm prints, hand topography
  2. iris scans, voice patterns
  3. signatures

biometrics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

authorization

A

the matching of an authenticated entity to a list of information assets and corresponding access levels

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

accountability or auditability

A

ensures all actions on a system authorized or otherwise can be attributed to an authenticated identity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Firewalls

A

prevents specific types of information from moving between the outside world, known as the untrusted network, and the inside world, known as the trusted network.

Firewalls can be categorized by:

processing mode,

development,

or structure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Firewall processing mode categories

A
  1. Packet-filtering firewalls
  2. Application gateways
  3. Circuit gateways
  4. MAC layer firewalls
  5. Hybrids-use a combination of the previous 4 - most firewalls fall in this category
17
Q

Packet-filtering firewalls

A

Packet-filtering firewalls examine every incoming packet header and can selectively filter packets based on header information such as destination address, source address, packet type, and other key information

18
Q

Packet-filtering Firewalls Types

A
  1. Static
  2. Dynamic
  3. Stateful (More thorough, more processing req.)
19
Q

Application Gateways - application-level firewall - application firewall

A

is frequently installed on a dedicated computer, separate from the filtering router, but is commonly used in conjunction with a filtering router. The application firewall is also known as a proxy server since it runs special software that acts as a proxy for a service request.

20
Q

Circuit Gateways Firewall

A

operates at the transport layer.

Again, connections are authorized based on addresses. Like filtering firewalls, circuit gateway firewalls do not usually look at traffic flowing between one network and another, but they do prevent direct connections between one network and another. They accomplish this by creating tunnels connecting specific processes or systems on each side of the firewall, and then allowing only authorized traffic, such as a specific type of TCP connection for authorized users, in these tunnels.

21
Q

MAC Layer Firewalls

A

Thus, MAC layer firewalls link the addresses of specific host computers to ACL entries that identify the specific types of packets that can be sent to each host, and block all other traffic

22
Q

Firewall processing inspection location

A
23
Q

Firewalls by generation

First - Fifth

A
  1. static packet-filtering firewalls
  2. application-level firewalls or proxy servers
  3. stateful inspection firewalls
  4. dynamic packet-filtering
  5. Kernel proxy - a specialized form that works under Windows NT Executive. Evaluates packets at multiple layers of the protocol stack
24
Q

Firewalls Categorized by Structure

A
  1. Commercial-grade firewall applicances
  2. Commercial-grade firewall systems
  3. Small office/Home office (SOHO) Firewall appliances
  4. Residential-Grade Firewall Software
25
Q

Firewall Architectures

A
  1. Packet-filtering routers
  2. Screened-host firewalls
  3. Dual-Homed firewalls
  4. Screened subnet firewalls
26
Q

Packet Filtering Routers

A

Most organizations with an Internet connection have some form of a router at the boundary between the organization’s internal networks and the external service provider. Many of these routers can be configured to reject packets that the organization does not want to allow into the network

27
Q

Sreened Host Firewalls

A

Screened host firewalls combine the packet-filtering router with a separate, dedicated firewall, such as an application proxy server.

Bastion Host - the separate host/proxy server - sole defender on the network perimeter - sometimes called sacrificial host

28
Q

Dual-Homed Host Firewalls

A

When this architectural approach is used, the bastion host contains two NICs (network interface cards) rather than one, as in the bastion host configuration. One NIC is connected to the external network, and one is connected to the internal network, providing an additional layer of protection. With two NICs, all traffic must physically go through the firewall to move between the internal and external networks.

29
Q

Screened Subnet Firewalls (with DMZ)

A

The dominant architecture used today is the screened subnet firewall. The architecture of a screened subnet firewall provides a DMZ. The DMZ can be a dedicated port on the firewall device linking a single bastion host, or it can be connected to a screened subnet

Until recently, servers providing services through an untrusted network were commonly placed in the DMZ. Examples of these include Web servers, file transfer protocol (FTP) servers, and certain database servers. More recent strategies using proxy servers have provided much more secure solutions

30
Q

4 Questions to consider to select the right firewall

A
  1. Which type of firewall technology offers the right balance between protection and cost for the needs of the organization?
  2. What features are included in the base price? What features are available at extra cost? Are all cost factors known?
  3. How easy is it to set up and configure the firewall? How accessible are the staff technicians who can competently configure the firewall?
  4. Can the candidate firewall adapt to the growing network in the target organization?
31
Q

VPNs must:

A
  1. Encapsulate
  2. Encrypt
  3. Authenticate
32
Q

VPNs Transport Mode and Tunnel Mode

A

Transport Mode

In transport mode, the data within an IP packet is encrypted, but the header information is not. This allows the user to establish a secure link directly with the remote host, encrypting only the data contents of the packet. The downside to this implementation is that packet eavesdroppers can still identify the destination system. Once an attacker knows the destination, he or she may be able to compromise one of the end nodes and acquire the packet information from it

Tunnel Mode

Tunnel mode establishes two perimeter tunnel servers that encrypt all traffic that will traverse an unsecured network. In tunnel mode, the entire client packet is encrypted and added as the data portion of a packet addressed from one tunneling server to another. The receiving server decrypts the packet and sends it to the final address. The primary benefit to this model is that an intercepted packet reveals nothing about the true destination system