Chapter 3 - Implementation Flashcards
Domain Name System Security Extensions (DNSSEC)
Validates DNS responses such as origin authentication and data integrity
Prevents attackers from manipulating or poisoning the responses to DNS requests
Secure Shell (SSH)
An encrypted terminal communication that provides secure terminal communication and file transfer features
Secure/ Multipurpose Internet Mail Extensions (S/MIME)
Keep emails confidential
Allows to protect information and provide digital signatures
Secure Real-time Transport Protocol (SRTP)
Take normal conversation across the network and add encryption so nobody can listen to your conversation
Uses AES
HMAC-SHA1
Lightweight Directory Access Protocol Over SSL (LDAPS)
Used for reading and writing directories over an Internet Protocol network
Uses SSL and/ or Simple Authentication and Security Layer (SASL)
File Transfer Protocol, Secure (FTPS)
Transferring files securely between devices
Uses SSL for encryption
SSH File Transfer Protocol (SFTP)
Provides secure file system functionality
Resuming interrupted transfers, directory listings, remote file removal
Uses SSH for encryption
Simple Network Management Protocol, Version 3 (SNMPv3)
Used for security when querying routers and switches
Provides confidentiality, integrity, and authentication
Hypertext Transfer Protocol over SSL/TLS (HTTPS)
Secure version of HTTP
Used for making sure our browser communication is running over an encrypted connection
IPSec
Communicating between two locations across the internet in a secure form - encryption and packet signing (integrity)
IPSec - Authentication Header (AH)/ Encapsulating Security Payloads (ESP)
AH - provides integrity
ESP - provides encryption
IPSec - Tunnel/ Transport
Tunnel mode is used to create virtual private networks for network-to-network communications
Transport mode, only the payload of the IP packet is usually encrypted or authenticated
Post Office Protocol (POP)/ Internet Message Access Protocol (IMAP)
A way to send and receive email securely
Both use SSL for encryption
Protocol Use Cases - Voice and Video
Use SRTP
Keeps conversations private by using AES
Protocol Use Cases - Time Synchronization
Use NTPsec
Secure network time protocol
Protocol Use Cases - Email and Web
Email - Use S/MIME
Web - Use HTTPS over SSL/ TLS
Protocol Use Cases - File Transfer
Use FTPS or SFTP (SSH File Transfer Protocol)
Protocol Use Cases - Directory Services
Use LDAP
Protocol Use Cases - Remote Access
Use SSH
Protocol Use Cases - Domain Name Resolution
Use DNSSec
Protocol Use Cases - Routing and Switching
Use SSH with SNMPv3 and HTTPS
Protocol Use Cases - Network Address Allocation
Use DHCP
Protocol Use Cases - Subscription Services
Use automation subscriptions with constant updates and check for encryption/ integrity checks
Dynamic Host Configuration Protocol (DHCP)
Assigning IP addresses and other communication parameters to devices connected to the network using a client–server architecture
Starvation Attacks
The Endpoint
Physical devices that connect to a network system such as mobile devices, desktop computers, virtual machines, embedded devices, and servers
Antivirus
Software designed to detect and destroy computer viruses
Examples: Trojan horses, worms
Anti-malware
Software designed to detect and destroy computer viruses
Examples: Spyware, adware
Endpoint Detection and Response (EDR)
A method of threat protection that detects a threat, investigates the threat, and responds to the threat
Data Loss Prevention (DLP)
The detection of potential data breaches/data ex-filtration transmissions
Data “leakage”
Next-generation Firewall (NGFW)
Combining a traditional firewall with other network device filtering functions and controls
Application features, attacks and malware, encrypted data, and access to URLs
Host-based Intrusion Prevention System (HIPS)
Recognizes and blocks known attacks
Secure OS and application configs and validates incoming service requests
Host-based Intrusion Detection System (HIDS)
Uses log files to identify intrusions
Can reconfigure firewalls to block
Host-based Firewall
A personal software that runs on every endpoint that examines traffic and processes
Boot Integrity
Ensures that the operating system kernel has not been modified by any malware
Rootkits
Boot Security/ Unified Extensible Firmware Interface (UEFI) (BIOS)
A set of routines residing in firmware that boots the operating system and sets up the hardware
Measured Boot
Process of measuring each component, from firmware up through the boot start drivers to provide a way to inform the last software stage if someone tampered with the platform
Boot Attestation
Receives the boot report and changes are identified and made if there have been malware infections
Database Security
Protecting stored data and the transmission of data
Application Security
The process of developing, adding, and testing security features within applications to prevent security vulnerabilities
Input Validations
Process of checking to see if all input is correct and making the change if it isn’t
Normalization
Secure Cookies
Information used for tracking, personalization, and session management that is stored on your computer by the browser
Hypertext Transfer Protocol (HTTP) Headers
An additional layer of security that ensures encrypted communication
Prevents XSS attacks
Code Signing
Code digitally signed by the developer to show the code has not been altered
Allow List
Nothing can run unless it’s approved
Block/ Deny List
Nothing on this list can be executed
Secure Coding Practices
A balance between time and quality
Make sure to test - QA
Static Code Analysis
The analysis of computer programs performed without executing them
Manual Code Review
The process of reading the source code line by line to look out for possible vulnerabilities
Dynamic Code Analysis
Designed to test a running application for potentially exploitable vulnerabilities
Fuzzing/ Fuzzers
The injection of invalid, malformed, or unexpected inputs into a system to reveal software defects and vulnerabilities
Hardening
Minimizing the attack surface and removing all possible points of exploitation
Open Ports and Services
Possible point of entry
Controlled with firewall
0-65,535
Registry
Primary configuration database used to know when applications are modified
Disk Encryption
The prevention of access to application data files
Operating System (OS) Hardening
Doing regular updates, managing user accounts, limiting network access, and keep anti-malware and antivirus up to date
Patch Management
The systematic notification, identification, deployment, installation, and verification of operating system and application software code revisions
Patch Management - Third Party Updates
Process of installing patches to third-party applications, that are installed on your company’s endpoints
Patch Management - Auto-update
Not very good because an update might not be what you want
Test first
Self-encrypting Drive (SED)
A hardware based full disk encryption that does not need an operating system software
Opal
Standard specification of SED
Defines a way of encrypting the stored data so unauthorized person who gains possession of the device cannot see the data
Hardware Root of Trust
The ability to trust that the system is going to be safe and secure
Trusted Platform Module (TPM)
Designed to help with cryptographic functions that are used within the operating system
Sandboxing
Gives users a safe, lightweight environment to execute code and run applications to test
Full-disk Encryption (FDE)
Encrypting everything on the drive
Load Balancing
Process of distributing a set of tasks over multiple servers, with the aim of making their overall processing more efficient
Active/ Active Load Balancing
Having two or more load balancer servers running at the same time
Active/ Passive Load Balancing
Having some servers on standby and when the active server fails, the passive server takes over
Load Balancing Scheduling
Round-robin - each server is selected in turn
Weighted round-robin - prioritizing the server use
Dynamic round-robin - Monitor server load and send to server with the lowest use
Load Balancing Persistence
Directing a client’s requests to the same backend web or application server for the duration of a “session” or the time it takes to complete a task or transaction
Network Segmentation
An architectural approach that divides a network into multiple segments or subnets, each acting as its own small network
Segmentation w/ Virtual Local Area Networks (VLANs)
Creates a collection of isolated networks within the data center
Severely hinders access to system attack surfaces
Screened Subnet
Additional layer of security between the internet and you
East-west Traffic
Traffic between device in the same data center
Extranet
A private network for partners and authorized users
Examples: vendors, suppliers
Intranet
Private network for employees within a company only
Zero Trust
A framework that assumes a complex network’s security is always at risk to external and internal threats
Virtual Private Network (VPN)
Mechanism for creating a secure connection between a computing device and a computer network or internet
Virtual Private Network (VPN) - Always-on
Automated service that establishes a connection between the client and the VPN with no user interactions whatsoever
Full VPN Tunnel
Remote user sends everything to the VPN concentrator
Split VPN Tunnel
Remote user sends some information to VPN concentrator and separate website
Remote Access VPN
Enables users to connect to a private network remotely using a VPN
Site-to-site VPN
If you want to connect to location together with two concentrators
Example: corporate network and remote site
Layer 2 Tunneling Protocol
Connecting sites over a layer 3 network as if they were connected at layer 2
SSL/ TLS VPN
Created using the SSL protocol to create a secure and encrypted connection over a less-secure network, such as the Internet
Hypertext Markup Language Version 5 (HTML5) VPNs
Creates a VPN tunnel without a separate VPN application
Network Access Control (NAC)
The process of restricting unauthorized users and devices from gaining access to a corporate or private network
Agent Network Access Control
The process of restricting unauthorized users and devices from gaining access to a corporate or private network
Agentless Network Access Control
Uses the Active Directory to make checks of user device during login and logoffs actions
Out-of-band Management
The management of devices and IT assets remotely without using the corporate LAN
Port Security
Help secure the network by making sure to block foreign devices from forwarding packets
Bridge Protocol Data Unit (BPDU) Guard
Prevent attacks on a network by blocking Bridge Protocol Data Units (BPDUs) that are sent from unauthorized devices
Enabled port shuts down as soon as a BPDU is received
Loop Prevention
The sending of traffic between two switches forever
The use of IEEE standard 802.1D prevents loops
Dynamic Host Configuration Protocol (DHCP) Snooping
Layer 2 security technology incorporated into the operating system of a capable network switch that filters DHCP traffic determined to be unacceptable
Media Access Control (MAC) Filtering
A security access control method whereby the MAC address assigned to each network interface controller is used to determine access to the physical hardware address
Jump Servers
A hardened and monitored device that spans two dissimilar security zones and provides a controlled means of access between them
Proxy Server
A system that sits between the users and external network to receive and send user requests as well as catching information, access control, URL filtering, and content scanning
Forward Proxy Server
Used to protect and control user access to the internet
“Internal Proxy”
Reverse Proxy Server
Used to protect inbound traffic from the internet to your internal service
Network-based Intrusion Detection System (NIDS)
Detects and reports network security problems by monitoring network or system activities for malicious or anomalous behavior
Network-based Intrusion Prevention System (NIPS)
A network security tool that continuously monitors a network for malicious activity and takes action to prevent it
Signature-based Intrusion Prevention
Monitors inbound network traffic to find sequences and patterns that match a particular attack signature
Anomaly-based Intrusion Prevention
An intrusion detection system for detecting both network and computer intrusions and building a baseline of what’s “normal”
Behavior-based Intrusion Prevention
An intrusion detection system for recording expected patterns concerning the entity being monitored and reporting it
Heuristic Intrusion Prevention
A system that uses artificial intelligence to scan for malicious behavior from a program either within the system, or trying to access the system
Passive Monitoring Intrusion Prevention
The examination of a copy of the network traffic
Cannot block or prevent the traffic
Inline Monitoring Intrusion Prevention
Sits in the middle or inline the network traffic and monitors and control in real-time
Hardware Security Module (HSM)
A device specifically designed to manage and control a large environment
Safeguards and manages cryptographic keys and provides cryptographic processing
Collectors
A console(s) that receives all censored data and provides output of what is going on on the network
Web Application Firewall (WAF)
Filters, monitors, and blocks HTTP/ HTTPS traffic to and from a web service
Stateful Firewall
Keeps track and monitors the state of active network connections while analyzing incoming traffic and looking for potential traffic and data risks
Stateless Firewall
Does not keep track of traffic flows and examines each packet individually regardless of history
Unified Threat Management (UTM)
When multiple security features or services are combined into a single device within your network
Includes: web security gateway, URL filter, malware inspection, spam filter, CSU/ DSU, Router, switch, firewall, IDS/ IPS, bandwidth shaper, VPN endpoint
Network Address Translation (NAT) Gateway
Used to enable instances present in a private subnet to help connect to the internet or AWS services
Content/ URL Filter
Blocks users from loading questionable websites or hosted files via corporate device or network resources
Open-source Firewall
Provides traditional firewall functionality
Proprietary Firewall
Traditional firewall with features like application control and high-speed hardware
Hardware Firewall
Provides efficient and flexible connectivity options
Software Firewall
Can be installed on own hardware from anywhere
Appliance Firewall
Has the fattest throughput
Host-based Firewall
Application-aware and can view non-encrypted data
Virtual Firewall
Provides valuable East/ West network security
Access Control List (ACL)
Specifies which users or system processes are granted access to resources, as well as what operations are allowed on given resources
Quality of Service (QoS)
Describes the process of controlling traffic flows and ensuring the performance of critical applications with limited network capacity
Implications of IPv6
Most recent version of the Internet Protocol
Secures most attacks but new attacks will occur since this is new
Port Mirroring/ Port Spanning
Cross connecting two or more ports on a network switch so that traffic can be simultaneously sent to a network analyzer or monitor connected to another port
Port Taps
A simple device that connects directly to the cabling infrastructure to split or copy packets for use in analysis and security