Chap 10: Secure Communications and Network Attacks Flashcards
Understand PPP.
Point-to-Point Protocol (PPP) is an encapsulation protocol designed to support the transmission of IP traffic over dial-up or point-to-point links. The original PPP options for authentication were PAP, CHAP, and EAP.
Define PAP, CHAP, and EAP.
Be able to provide examples of EAP.
PAP transmits usernames and passwords in cleartext. CHAP performs authentication using a challenge-response dialogue that cannot be replayed. EAP
allows customized authentication security solutions.
Over 40 EAP methods are defined, including LEAP,
PEAP, EAP-SIM, EAP-FAST, EAP-MD5, EAP-POTP, EAP-TLS, and EAP-TTLS.
Understand IEEE 802.1X.
IEEE 802.1X defines the use of encapsulated EAP to support a wide range of authentication options for LAN connections. The IEEE 802.1X standard is formally named “Port-Based Network Access Control.”
Understand voice communications security.
Voice communications are vulnerable to many attacks, especially as voice communications become an important part of network services.
You can obtain confidentiality by using encrypted communications. Countermeasures must be deployed to protect against interception, eavesdropping, tapping, and other types of exploitation.
Be familiar with voice communication topics, such as POTS, PSTN, PBX, and VoIP.
Know about port security.
Port security can mean the physical control of all connection points, such as RJ-45 wall jacks or device ports. Port security is the management of
TCP and User Datagram Protocol (UDP) ports. Port security can also refer to the need to authenticate to a port before being allowed to communicate through or across the port (i.e., IEEE 802.1X).
Know the threats associated with PBX systems and the countermeasures to PBX fraud.
Countermeasures to PBX fraud and abuse include many of the same precautions you would employ to protect a typical computer network: logical or technical controls, administrative controls, and physical controls.
Understand the security issues related to VoIP.
VoIP is at risk for caller ID spoofing, vishing, call manager software/firmware attacks, phone hardware attacks, DoS, MitM/on-path attacks, spoofing, and switch hopping.
Recognize what phreaking is.
Phreaking is a specific type of attack in which various types of technology are used to circumvent the telephone system to make free long-distance calls,
to alter the function of telephone service, to steal specialized services, or to cause service disruptions.
A phreaker is an attacker who performs phreaking.
Understand the issues of remote access security management.
Remote access security management requires that security system designers address the hardware and software components of an implementation along with issues related to policy, work tasks, and encryption.
Know various issues related to remote access security.
Be familiar with remote access, dial-up connections, screen scrapers, virtual applications/desktops, and general telecommuting security concerns.
Understand multimedia collaboration.
Multimedia collaboration is the use of various multimedia-supporting communication solutions to enhance distance collaboration and communications.
Know the purpose of load balancers.
The purpose of load balancing is to obtain more
optimal infrastructure utilization, minimize response time, maximize throughput, reduce overloading, and eliminate bottlenecks. A load balancer is used to spread or distribute network traffic load across several network links or network devices.
Understand active/active.
An active-active system is a form of load balancing that uses all available pathways or systems during normal operations. But has reduced capacity in adverse conditions.
Understand active/passive.
An active-passive system is a form of load balancing that keeps some pathways or system in an unused dormant state during normal operations. And is able to maintain consistent capacity during abnormal conditions.
Understand how email security works.
Internet email is based on SMTP, POP3, and IMAP.
It is inherently insecure. It can be secured, but the methods used must be addressed in a security policy. Email security solutions include using S/MIME, PGP, DKIM, SPF, DMARC, STARTTLS, and Implicit SMTPS.