Chapter 4 Flashcards

Securing Your Network (66 cards)

1
Q

IDS

A

Intrusion detection systems monitor a network and send alerts when they detect suspicious events on a system or network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

IPS

A

Intrusion prevention systems react to attacks in progress and prevent them from reaching systems and networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

HIDS

A

Host-based intrusion detection system

Software installed on a system to detect attacks

It protects local resources on the host

A host-based intrusion prevention system (HIPS) is an extension of HIDS

It is software installed on a system to detect and block attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

NIDS

A

Network based intrusion detection system

A device that detects attacks and raises alerts

A NIDS is installed on network device, such as routers or firewalls, and monitors network traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Port Mirror

A

A monitoring port on a switch

All traffic going through the switch is also sent to the port mirror

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Taps

A

Monitoring ports on a network device

IDSs use taps to capture traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Signature-based

A

A type of monitoring used on intrusion detection and intrusion prevention systems

It detects attacks based on known attack patterns documented as attack signatures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Heuristic/behavioral-based

A

A type of monitoring on intrusion detection and intrusion prevention systems

It detects attacks by comparing traffic against a baseline

It is also known as anomaly detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

NOC

A

Filler

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

False Negative

A

A security icident that isn’t detected or reported

As An example, A NIDS false negative occurs if an attack is active on the network but the NIDS does not raise an alert

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

NIPS

A

Network-based intrusion prevention system

A device that detects and stops attacks in progress

A NIPS is placed inline (In-Band) with traffic so that it can actively monitor data streams

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Inline

A

A configuration that forces traffic to pass through a device

A NIPS is place inline, allowing it to prevent malicious traffic from entering a network

Sometimes called in-band, as opposed to out-of-band

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Out-of-Band

A

A configuration that allows a device to collect traffic without the traffic passing through it

sometimes called passive, opposed to inline

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

ACLs

A

Access control lists are lists of rules used by routers and stateless firewalls

These devices use the ACL to control traffic based on networks, subnets, IP addresses, ports, and some protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

SCADA

A

Supervisory control and data acquisition

A system used to control an ICS such as a power plant or water treatment facility

Ideally, a SCADA is within an isolated network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

RATs

A

Remote access Trojans are malware that allows an attacker to tak control of a system from a remote location

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

DMZ

A

Demilitarized zone is a buffer zone between the internet and an internal network

Internet clients can access the services hosted on servers in the DMZ, but the DMZ provides a layer of protection for the internal network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

SSL/TLS Accelerators

A

Devices used to handle TLS traffic

Servers can off-load TLS traffic to improve performance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

SSL Deccryptors

A

Devices used to create separate SSL (or TLS) sessions

They allow other security devices to examine encrypted traffic sent to and from the Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

SDN

A

A Software Defined Network is a method of using software and virtualization technologies to replace hardware routers

SDNs separate the data and control planes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Honeypot

A

A server designed to attract an attacker

It typically has weakened security encouraging attackers to investigate it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Honeynet

A

A group of honeypots in a network

Honeynets are often configured in virtual networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

IEEE 802.1x

A

An authentication protocol used in VPNs and wired and wireless networks

VPNs often implement it as a RADIUS server

Wired networks use it for port-based authentication

Wireless networks use it in Enterprise modee

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

IEEE 802.1x

A

An authentication protocol used in VPNs and wired and wireless networks

VPNs often implement it as a RADIUS server

Wired networks use it for port-based authentication

Wireless networks use it in Enterprise mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
WLAN
Filler
26
AP
An Access Point is a device that connects wireless clients to wireless networks Sometimes called Wireless Access Point (WAP)
27
SSID
Service Set Identifier is the name of a wireless network SSIDs can be set to broadcast so users can easily see it Disabling SSID broadcast hides it from casual users
28
MAC Filtering
A form of network access control to allow or block access based on the MAC address It is configured on switches for port security or on APs for wireless security
29
Antenna Types
Filler
30
Network Architecture Zones
Filler
31
WPA
Wi-Fi Protected Access is a legacy wireless security protocol it has been superseded by WPA2
32
WPA2
Wi-Fi Protected Access II is a wireless security protocol It supports CCMP for encryption, which is based on AES It can use Open mode, a pre-shared key, or Enterprise mode
33
TKIP
Temporal Key Integrity Protocol is a legacy wireless security protocol CCMP is the recommended replacement
34
AES
Advanced Encryption Standard is a strong symmetric block cipher that encrypts data in 128-bit blocks AES can use key sizes of 128 bits, 192 bits, or 256 bits
35
PSK
Pre-shared key is a wireless mode that uses a pre-shared key (similar to a password or passphrase) for security Compare with Enterprise and Open modes
36
Enterprise
A wireless mode that uses an 802.1x server for security It forces users to authenticate with a username and password Compare with Open and PSK modes
37
Authentication Protocols
Filler
38
Disassociation Attck
An attack that removes wireless clients from a wireless network
39
WPS
Wi-Fi Protected Setup is a method that allows users to easily configure a wireless network, often by using only a PIN WPS brute force attacks can discover the PIN
40
WPS Attack
An attack against an AP A WPS attack discovers the eight-digit WPS PIN and uses it to discover the AP passphrase
41
Rouge AP
An unauthorized AP It can be placed by an attacker or an employee who hasn't obtained permission to do so
42
Evil Twin
A type of rouge AP An evil twin has the same SSID as a legitimate AP
43
Jamming
A DoS attack against wireless networks It transmits noise on the same frequency used by a wireless network
44
IV Attack
An Initialization Vector attack is a wireless attack that attempts to discover the IV Legacy wireless security protocols are susceptible to IV attacks
45
NFC Attack
An attack against mobile devices that use near field communication (NFC) NFC is a group of standards that allow mobile devices to communicate with nearby mobile devices
46
Bluejacking
An attack against Bluetooth device It is the practices of sending unsolicited messages to nearby Bluetooth devices
47
Bluesnarfing
An attack against Bluetooth devices Attackers gain unauthorized access to Bluetooth devices and can access all the data on the device
48
Replay Attack
An attack where the data is captured and replayed Attackers typically modify data before replaying it
49
RFID
Filler
50
RFID Attack
Attacks against radio-frequency identification (RFID) systems Some common RFID attacks are eavesdropping, replay, and DoS
51
VPN
Virtual Private Networks are a method that provides access to a private network over a public network such as the internet VPN concentrators are dedicated devices used to provide VPN access to large groups of users
52
NICs
Filler
53
Remote Access VPN
Filler
54
IPsec
Internet Protocol Security is a suite of protocols used to encrypt data-in-transit that can operate in both tunnel mode and transport mode It uses Tunnel mode for VPN traffic and Transport mode in private networks
55
Authentication (AH)
Authentication Header is an option within IPsec to provide authentication and integrity
56
Encryption (ESP)
Encapsulating Security Payload is an option within IPsec to provide confidentiality, integrity, and authentication
57
TLS
Transport Layer Security is the replacement for SSL TLS is used to encrypt data-in-transit Like SSL, it uses certificates issued by CAs
58
SSTP
Filler
59
TLS Tunneling
Filler
60
Split Tunnel
An encrypted connection used with VPNs A split tunnel only encrypts traffic going to private UP addresses used in the private network
61
Full Tunnel
An encrypted connection used with VPNs When a user is connected to a VPN, all traffic from the user is encrypted
62
UTM
Unified threat management is a group of security controls combined in a single solution UTM appliances can inspect data streams for malicious content and block it
63
NAC
Network access control is a system that inspects clients to ensure they are healthy Agents inspect clients and agents can be permanent or dissolvable (also known as agentless)
64
Site-to-Site VPNs
Filler
65
Always-On VPN
Filler
66
Identity and Access Services
Filler