Chapter 10 - Network Security Flashcards

1
Q

What are sone of the potential losses associated with security breaches?

A
  • reduced customer confidence
  • loss of income when systems are offline
  • cost of lawsuits for disclosure of private information
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

True or False: The value of an organization’s data and applications typically exceeds the cost of the physical network.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the primary goals of network security?

A
  • confidentiality: protection from unauthorized disclosure of data.
  • integrity: assurance that data has not been altered or destroyed.
  • availability: providing continuous operations of hardware and software.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Business continuity involves preventing what three things to ensure that operations remain ongoing?

A
  • disruption: loss or reduction in network service
  • destruction: viruses or hard disk crash destroy data
  • disaster: may destroy servers or network elements and circuits.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are network controls?

A

mechanisms (such as software, hardware, rules or procedures) that are designed to reduce or eliminate the threats to network security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the three main types of controls?

A
  • preventative controls
  • detective controls
  • corrective controls
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the purpose of a risk assessment?

A

A risk assessment is used to assign a level of risk to various threats by comparing them to the controls in a control spreadsheet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

With a risk assessment you must identify what two things?

A

Assets and threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The value of an organization’s assets are a function of what three things?

A
  • straight replacement cost
  • personnel time to replace asset
  • lost revenue due to absence of the asset
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Threats are ranked based on what two things?

A
  • probability of occurrence

- likely cost if the threat materializes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Describe the two pronged approach to continuity planning

A
  • development of controls (to prevent events from having a major impact
  • disaster recovery plan (to recover lost data after a disaster)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the difference between a virus and a worm?

A
  • a virus is a malware program that replicates itself by spreading from one computer to another through human intervention.
  • a worm is malware that spreads copies of itself from computer to computer without human intervention.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are DoS and DDoS attacks?

A

Denial of Service attacks (DoS) are when an attacker bombards a server with requests so that its processor is pushed to very high usage levels. This makes it difficult to service legitimate user requests.
Distributed Denial of Service (DDoS) involves a DoS attack launched from thousands of computers from around the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Name four methods for combating DoS attacks

A
  • use multiple dispersed redundant servers
  • traffic filtering (verify source IP address… not very effective)
  • traffic limiting (limit aggregate rate of packets for all users)
  • intrusion detection and prevention system (IDS/IPS) (perform traffic analysis to determine normal traffic patterns and block anything abnormal)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How can redundancy help improve device failure protection? Give four examples.

A

If one fails the organization can make use of a backup (redundancy)
Examples:
- Uninterruptible Power Supply (UPS) (detect power surges so that the user can unplug and save data)
- Redundant Array of Inexpensive Disks (RAID) (also called disk mirroring - save data on storage disks)
- Server Clustering
- Web Clustering (decentralize network resources)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Name as many of the 9 elements of a disaster recovery plan as you can

A
  • names of decision making managers
  • staff assignments and responsibilities
  • list priorities for “first fix”
  • location of alternative facilities
  • recovery procedures for communication facilities
  • actions to be takes in case of damage or threats
  • manual processes after damage
  • plan for updating and testing procedures
  • safe storage of the DRP itself
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Describe a two level disaster recovery plan DRP

A

level 1 - internal:
- build enough capacity and keep enough spare equipment to recover from minor disaster
level 2 - external DRP outsourcing:
- rely on professional disaster recovery firms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Describe intrusion and list the four types of intruders

A

Intrusion is when there is unauthorized access to a controlled resource (data and equipment)
Intruder types:
- casual intruders (limited knowledge playing with hacking)
- security experts (hackers and crackers (hackers who cause damage))
- professional hackers (break into computers for a purpose)
- employees and partners (Legitimate access to network but gain access to information that they are not authorized to use)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is the role of network perimeter security? What is it intended to protect?

A
network perimeter security is intended to stop intruders at the perimeter of the network.
It protects access points to the network such as:
- internet
- wired LAN
- wireless LAN 
it protects these access points using:
- perimeter security firewall 
- network address translation 
- physical security
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is a firewall?

A

a device or software designed to block data packets that do not conform to a specific set of rules

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

True or false: firewalls can be hardware based or software based.

A

true

22
Q

Name four commonly used firewalls and describe each of them

A
  • packet-level (examines the source and destination TCP&IP addresses of packets and allows or denies passage based on the access control list (ACL) rules.)
  • stateful firewall (maintains information on the state of connections and performs Stateful Packet Inspections (SPI))
  • application-level (controls input, output and access to a specific application or service. Also performs high-level analysis based on reassembled packet stream)
  • network address translation (NAT) (used to translate a private IP address to a public routable IP address)
23
Q

What are the four states of a stateful firewall?

A
  • new
  • established
  • related
  • invalid
24
Q

Draw the typical firewall architecture

A

slide 36

25
Q

Name three methods of reducing risk associated with personnel security

A
  • provide proper security education
  • perform background checks
  • implement error and fraud controls
26
Q

What are the three main threats associated with server and client protection (intrusion prevention). Describe each.

A
  • security holes (a bug that permits unauthorized access)
  • operating systems (tradeoff between security and ease of use in operating systems)
  • trojan horses (remote access management consoles that enable users to access a computer and manage it from afar)
27
Q

What is a zero-day attack?

A

when hackers attempt to break into networks through a hole before a patch is available.

28
Q

Name some common trojan types

A
  • spyware
  • adware
  • distributed DoS
29
Q

What is encryption?

A

encryption is the process of disguising information by mathematical rules.

30
Q

What are the main components of encryption systems?

A
  • plaintext (unencrypted message)
  • encryption algorithm (function used to encipher the plaintext)
  • key (a set of characters combined with the plaintext by an algorithm)
  • ciphertext (produced from plaintext by encryption function)
31
Q

Name and describe three encryption techniques

A
  • symmetric encryption (uses same algorithm and key for encryption and decryption)
  • asymmetric encryption (uses two different keys with “one way” encryption functions - public key and private key)
  • digital signatures (variation of public key encryption)
32
Q

What are the main criticisms of symmetric encryption?

A
  • data is vulnerable to interception
  • key management is very challenging
  • can be cracked by trying all of the key combinations
33
Q

Draw the diagram for symmetric encryption

A

slide 37

34
Q

How does asymmetric encryption address the key management issue?

A

with public and private keys:

  • sender uses one key (private or public) to encrypt
  • receiver uses the opposite key to decrypt
  • same key cannot be used to encrypt and decrypt, therefore, no sensitive key information is exchanged
35
Q

Draw the diagram for asymmetric encryption

A

slide 38

36
Q

What is a hash function and when is it used?

A

a hash function maps message data of arbitrary length to numeric data of a fixed length. It is used to encrypt and decrypt a digital signature.

37
Q

What are the three attributes of the hash function?

A
  • deterministic (same result every time with same input)
  • fixed length output (128 bits regardless of input)
  • extremely low probability of collision (different inputs do not create the same output)
38
Q

What is a digital signature?

A

a digital signature is the hash of (data + other info) encrypted using the sender’s private key

39
Q

How are digital signatures verified?

A

digital signatures are verified by generating the hash on the original data. If both hash values match then the data is legitimate.

40
Q

Draw the diagram for digital signatures

A

slide 39-41

41
Q

What are the three elements of the Public Key Infrastructure (PKI)?

A
  • Certificate Authority (CA)
  • Certificate
  • Fingerprint (only for higher security messages)
42
Q

Describe the PKI Public Key Infrastructure process

A
  • user registers with certificate authority (CA)
  • CA issues digital certificate
  • user disseminates or installs certificate on server
  • customer authenticates identity with CA’s public key
43
Q

What are the three basis of user authentication?

A
  • something you know (password)
  • something you have (smart card)
  • something you are (biometric)
44
Q

Describe central authentication and its benefits

A

Log in server is used to authenticate the user and issue a certificate. The primary benefit is that users do not have to enter their authentication information as often.

45
Q

What is social engineering?

A
  • breaking security simply by asking how
  • attacker’s impersonate employee to gain access to sensitive data
  • phishing is an example of social engineering
46
Q

What is IDS/IPS? Describe each.

A

Intrusion Detection System:
- monitors traffic and alerts operator when abnormal patterns are found. Uses signature analysis and/or anomaly detection.
Intrusion Prevention System:
- IDS functions + blocks malicious activity

47
Q

Name three ways that an Intrusion Prevention System (IPS) detects unauthorized access

A
  • network-based IPS (link and monitor packets and report intrusions)
  • host-based IPS (HIPS) (monitor all activity on server as well as in/out traffic)
  • application based IPS (special form of host-based IPS. Application-based firewall runs on host.)
48
Q

Name two techniques used by IPS

A
  • misuse detection (monitor activities of signatures with known attacks)
  • anomaly detection (looks for anything that deviates from the norm)
49
Q

Draw the IPS firewall architecture

A

fuck it

50
Q

One method of intrusion recovery is called entrapment. Describe it

A

entrapment - use a honey pot:

- involves diverting attackers to a fake server and monitoring access to this server to use as proof of an attack