Chapter 10 Flashcards
Two ways to protect malware (and their advantages and disadvantages):
1) signature-based
Advantage: Accuracy is really high.
Disadvantage: You will miss new attacks, they can easily pass checking.
2) anomaly-based
compares against baseline traffic on network
Advantage: Accomodates new types of attacks
Disadvantage: “operation i usually see is different”
May generate false positive
Where to focus for Network Security (4 points)?
- Protecting networks
- Protecting network traffic
- Mobile device security
- Network security tools
A well-configured and patched network is the _______ of any security program
foundation
What is Network segmentation?
• Divide a network into multiple smaller independent networks, called a subnet
How can we control the flow of traffic between subnets?
o Allowing or disallowing traffic
o Blocking the traffic entirely
We can control traffic flow within the subnet for _______ purposes
troubleshooting
True or False: Traffic monitoring is easier in subnets
True
Why do we funnel Network Traffic through choke points?
to inspect, filter, and control the traffic
What are Choke points?
o Routers that move traffic from one subnet to another
o Firewalls or proxies that control traffic moving within, into, or out of our networks or portions of our networks
o Application proxies that filter the traffic for particular applications such as Web or e-mail traffic
Choke points come with some risk because if they ____ the network is _______
fail
compromised
“Choke points come with some risk because if they fail the network is compromised”
Redundancy helps to…
mitigate risk to our networks
Technical issues or attacks may impact network _______ devices; hence, network operations.
infrastructure
Good network design considers planned ________ for devices failing, connectivity loss etc.
redundancy
Give an example of planning for redundancy:
In the even of a DDoS attack to a border device:
oRedundancy will allow us switch to a different connection to the Internet, or toute traffic through a different device until we solve current issue
What is a firewall?
A mechanism for maintaining control over the traffic that flows into and out of our network
Where should we place firewalls, typically?
- Typically on the border between our internal network and the Internet
- Can also be placed within our network for access control
What should we filter with firewalls?
Based on a variety of factors and largely depends on the complexity of the firewall
• Example: we may allow Web and e-mail traffic to pass, but block everything else
What is Packet Filtering?
- Inspecting contents of each packet individually to make a decision
- Based on the source and destination IP addresses, the port number, and the protocol being used
_____ _______ is one of the oldest and simplest of firewall technologies
Packet Filtering
Which firewall has the disadvantage that “it is possible to slip attacks through this type of firewall as packets are inspected individually”
Packet Filtering
What is the function of a Stateful Firewall?
Same working principle as in packet filtering, but a Stateful Firewall keeps track of the traffic at a granular level
A stateful firewall is able to watch the traffic over a ____ _______.
given connection
The connection state, as monitored by a stateful firewall, is maintained in a ____ ____.
state table
A given connection is defined by:
the source and destination IP addresses, the ports being used, and the already existing network traffic
True or False? A stateful firewall allows traffic that is part of a new or already established connection.
True
Difference between stateful firewall and packet inspection?
Stateful firewall assesses an entire connection while packet inspection is about inspecting individual packets
Best security policy is to put these two together
Most stateful firewalls can also function as a _____ ______ firewall, often combining the two forms of filtering.
packet filtering
A stateful firewall that also has a packet filtering component can do the following (2 objectives):
- Can identify and track the traffic related to a particular user initiated connection to a Web site
- Knows when the connection has been closed and further traffic should not legitimately be present
Example of a scanning tool?
Nmap
True or False: Packet filtering and stateful firewalls only inspect the structure of packets without inspecting the content.
True
______ adds extra layer of intelligence to firewalls through packet-content inspection.
Deep Packet Inspection
Deep Packet Inspection can block a large number of attacks at the price of ____.
delay
Deep Packet Inspection introduces ______ issue as content of our packets are inspected.
privacy
Proxy servers are…
A specialized variant of a firewall that can serve as a choke point
Proxy servers offer these functionalities (2):
- Offer security and performance by filtering unwanted traffic
- Allow us to log the traffic that goes through them for later inspection
What are some applications of proxy servers (3)?
Applications:
•Spam, Web traffic, and malware filtering
True of False: Nmap is a very useful tool for both OS and network
True
What is a Demilitarized Zone (DMZ) as it pertains to network security?
A combination of a network design feature and a protective device such as a firewall
What are DMZs used for?
Used to offer security for mail servers, proxy servers, software as a service application, and Web servers
Draw a diagram of a DMZ
https://i.imgur.com/oiFFYDN.png
What does IDS stand for in network security?
Intrusion Detection Systems
What is penetration testing?
Actively trying to break the system and analyze its level of security that way
What does an Intrusion Detection System do?
monitors networks, hosts, or applications to which it is connected for unauthorized activity
What are 3 types of IDS?
- Host-based intrusion detection systems (HIDSes)
- Application protocol-based intrusion detection systems (APIDSes)
- Network-based intrusion detection systems (NIDSes)
What does NIDSes stand for?
Network-based intrusion detection systems
What does APIDSes stand for?
Application protocol-based intrusion detection systems
What does HIDSes stand for?
Host-based intrusion detection systems
Placement of ______ important to efficiently monitor ongoing network traffic without overwhelming the _____.
NIDSes
Placement of NIDSes important to efficiently monitor ongoing network traffic without overwhelming the NIDSes.
Draw a diagram of an IDS:
https://i.imgur.com/ureBoKc.png
NIDSes may miss _____ _____ _____.
packet crafting attacks
What are packet crafting attacks?
- specifically designed packets of traffic that carry attacks or malicious code
- designed to avoid detection by IDSes, firewalls, and other similar devices