Chapter 4: Secure Communications and Network Attacks Flashcards

1
Q

What are secure communication protocols?

A

Protocols that provide security services for application-specific communications channels.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

List example secure communication protocols.

A

SKIP, swIPe, S-RPC, SSL, TLS, SET

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is SKIP?

A

Simple Key management for Internet Protocol. Designed to integrate with IPSec. Functions at layer 3. Can encrypt any subprotocol of TCP/IP. Replaced by IKE in 1998.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is swIPe?

A

Software IP Encryption. Layer 3 protocol for IP. Provides authentication, integrity, and confidentiality using an encapsulation protocol.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is S-RPC?

A

Secure Remote Procedure Call. An authentication service used to prevent unauthorized execution of code on remote systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is SSL?

A

Secure Sockets Layer. Developed by Netscape to protect communications between web server and client. Session oriented. Deployed using 40 or 128 bit keys. Superceded by TLS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is TLS?

A

Transport Layer Security. Similar to SSL, but stronger.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the features of SSL and TLS?

A

Permits secure communications over an insecure network
Supports one way authentication
Supports two way authentication using digital certificates
Often implemented as the initial payload of a TCP pacakge, allowing it to encapsulate all higher level protocols.
Can be implemented at lower levels (3) to operate as a VPN. This is called OpenVPN.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is SET?

A

Secure Electronic Transaction. Based on RSA and DES. Security protocol for transmission of transaction data over the internet. Not widely accepted. SSL/TLS sessions are preferred for secure e-commerce.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is CHAP?

A

An authentication protocol. Challenge Handshake Authentication Protocol. Encrypts username/passwords in a dialog that can’t be replayed. Periodically reauthenticates transparently to the user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a VPN?

A

A virtual private network. A communications tunnel that provides point-to-point transmission of both authentication and data traffic over an intermediary untrusted network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What problems exist with tunneling?

A

It’s generally inefficient because the tunnelling protocol has its own error detection, handling, acknowledgement, and session management.

It can create larger or additional packets on the network that use additional network bandwidth.

It is point-to-point and doesn’t handle broadcast traffic.

Tunnelling makes it difficult to impossible to monitor network traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

List 4 VPN protocols

A

PPTP, L2F, L2TP, IPSec.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a VLAN used for?

A

Hardware imposed network segmentation. Used to logically segment a network without changing its physical topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the traffic management functions of a VLAN?

A

Control and restrict broadcast traffic / block broadcasts between subnets and VLANs

Isolate traffic between entwork segments

Reduce a network’s vulnerability to sniffers

Protect against broadcast storms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What forms of remote access are typical for telecommuting?

A

Using a modem to dial up directly to a remote access server
Connecting to a network over the internet through a VPN.
Connecting to a terminal server through a thin-client connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

List the security considerations in granting remote access capabilities.

A

1) Remote access users should be stringently authenticated before being granted access
2) Only users who specifically need remote access for their assigned work tasks should be granted permission to use it
3) All remote communications should be protected from interception and eavesdropping, generally through encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What are the security concerns if secure communications channels are not established for remote access?

A

1) Anyone with a remote connection can atempt to breach the security of the organization, bypassing physical security controls
2) Telecommuters might use insecure or less secure systems to connect
3) Remote systems might be exposed to malicious code and might bring malware into the internal LAN
4) Remote systems might be less physically secure and be used by unauthorized entities
5) Remote systems might be more difficult to troubleshoot
6) Remote systems might be harder to upgrade or patch due to infrequent/slow connections

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is VoiP?

A

Voice over internet protocol.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What are the problems of VoiP?

A

1) Caller ID is easy to falsify
2) Call manager/VoiP systems have their own vulnerabilities
3) Man-in-the-middle attacks can be performed
4) Deploying VoiP on the same network as traditional clients can make 802.1X attacks possible, as well as VLAN and VoIP hopping.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What should the organization policy be with regard to modems?

A

No unauthorized modems can be allowed on any system connected to the private network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is RADIUS?

A

Remote Authentication Dial In User Service,, used to centralize authentication of rmote dial-up connections.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is TACACS?

A

An alternative to RADIUS. Integrates authentication and identification processes. Get more from p165.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is NAT?

A

Network address translation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What are the benefits of NAT?

A

1) Connect an entire network using only one or a few public IPs
2) Can use private IPs on the internal network
3) Hides the IP addressing scheme and network topology from the Internet
4) Restricts connections so that only traffic stemming from internally originating connections are allowed back into the network, automatically repelling most attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Describe Automatic Private IP Addressing

A

A method of assigning an IP address when DHCP fails. Primarily a Windows feature. Uses the Class B 169.254.X.X. Allows systems to communicate across the same broadcast domain, but not with any systems that have correctly configured IPs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What is Circuit Switching?

A

A dedicated physical pathway is created between two communicating parties. Originally used for telephone calls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What is Packet Switching?

A

Data is broken up into packets which are individually addressed and sent across intermediate networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Describe a DS-0 line

A

A dedicated line with a speed of 64 Kbps to 1.544 Mbps. A partial T1.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Describe a DS-1 line.

A

A dedicated line with a speed of 1.544 Mbps. A T1.

31
Q

Describe a DS-3 line.

A

A dedicated line with a speed of 44.736 Mbps. A T3.

32
Q

Describe a European digital transmission format 1 line.

A

Aka E1. 2.108 Mbps.

33
Q

Describe a European digital transmission format 3 line.

A

AKA E3. 34.368 Mbps.

34
Q

Describe cable modem or cable router speeds.

A

Typically 10Mbps+

35
Q

What is Committed Information Rate (CIR)?

A

A concept in frame relay connections, this is the guaranteed minimum bandwidth a service provider grants to their customers.

36
Q

Describe the types of technology that “virtual desktop” can refer to

A

1) A remote access tool that grants the user access to a distant computer by remote viewing/control of the KVM.
2) An extension of the virtual application concept encapsulating multiple applications into a virtual desktop
3) An extended or expanded desktop larger than the display being used

37
Q

What are the characteristics of security controls?

A

Transparency - ensuring that the control is unseen by users

Retransmission controls - determine whether all or part of a message is retransmitted if lost

38
Q

What is an open relay?

A

An open relay is a mail relay agent that doesn’t authenticate users before accepting and relaying mail. Open relays are prime targets for spammers.

39
Q

Add more on email security?

A

p181

40
Q

What are the objectives of email security?

A
  1. Provide for non-repudiation
  2. Restrict access to messages to their intended recipients (privacy)
  3. Maintain the integrity of messages
  4. Authenticate and verify the source of messages
  5. Verify the delivery of messages
  6. Classify sensitive content within or attached to messages
41
Q

Why is interception and eavesdropping on email messages easy?

A

By default, they aren’t encrypted.

42
Q

What is the number one transmission vector for malicious code?

A

Email.

43
Q

What is mail bombing?

A

A DOS effected by sending lots of email to a user or site.

44
Q

List the email security solutions

A

S/MIME
MIME Object Security Services (MOSS)
Privacy Enhanced Mail (PEM)
Pretty Good Privacy (PGP)

45
Q

More on email security solutions?

A

p184

46
Q

Guidelines for social engineering protection?

A
  1. Err on the side of caution whenever voice comms seem odd, out of place, or unexpected
  2. Always request proof of identity
  3. Require callback authorizations on all voice-only requests for network alterations or activities
  4. Classify information (usernames, passwords, IP addresses, etc) and clearly indicate which can be discussed or confirmed using voice.
  5. In priv info is requested over the phone by someone who should know it can’t be given over the phone, ask why it’s needed and reverify identity, then report it to the security administrator
  6. Never give out or change passwords via voice only comms
  7. When disposing of office docs, use secure disposal or destruction.
47
Q

Key points for PBX design

A

p 188

48
Q

What is a black box?

A

A phreaking device used to manipulate line voltages to steal long distance services.

49
Q

What is a red box?

A

A phreaking device used to simulate tones of coins being deposited into a pay phone. Usually just a tape recorder.

50
Q

What is a blue box?

A

A phreaking device that simulates a 2600 Hz tone to interact with telephone network trunk systems. Whistle, tape recorder, digital tone generator.

51
Q

What is a white box?

A

A phreaking device used to control the phone system. Dual tone multifrequency generator (keypad). Telephone repair personnel have these.

52
Q

What are the two basic types of Denial of Service attack?

A
  1. Attacks exploiting a vulnerability in hardware or software.
  2. Attacks that flood the communication pipeline.
53
Q

List countermeasures and safeguards against DoS attacks:

A
  1. Firewall, router, IDS that block attacks
  2. Disable echo reply on external systems
  3. Disable broadcast features on border systems
  4. Blocking spoofed packets from entering or leaving the network
  5. Keeping all systems patched with the most current security updates from the vendor
54
Q

Describe impersonation or masquerading.

A

The act of pretending to be someone or something you are not to gain unauthorized access to a system.

55
Q

How is impersionation different than spoofing?

A

Spoofing puts forth a false identity without any authentication.

56
Q

What is a reply attack?

A

A replay attack captures network traffic and replays it to gain access to a system. Unlikely to work.

57
Q

What is ARP?

A

Address Resolution Protocol. Maps an IP to a MAC address. Layer 3. Sends a broadcast request with the IP and asks for an assocaited MAC. Can be attacked by spoofing.

58
Q

How can you defend against ARP spoofing?

A

Static arp tables, monitor ARP caches, use an IDS.

59
Q

What is DNS poisoning or spoofing?

A

Altering the domain name to IP mappings in a DNS system to redirect traffic to a rogue system.

60
Q

How does DNS spoofing work?

A

it’s a race condition. You send a false reply when a system queries. If you get there first, you win.

61
Q

How do you block DNS spoofing?

A

The only real solution is DNSSEC.

62
Q

What is hyperlink spoofing?

A

Similar to DNS spoofing, redirects traffic to a rogue system.

63
Q

Which VPN protocols have native authentication protection?

A

PPTP, L2F, L2TP, IPSec

64
Q

Which VPN protocols have native data encryption?

A

IPSec. L2TP doesn’t, but can use IPSec. PP2P and L2F don’t.

65
Q

What VPN protocols does PPTP support?

A

IP only

66
Q

What VPN protocols does L2F support?

A

IP only

67
Q

What VPN protocols does IPSec support?

A

Any

68
Q

What VPN protocols does L2TP support

A

IP only

69
Q

Which VPN protocols support dial-up links?

A

PPTP, L2F, L2TP. IPSec doesn’t.

70
Q

What VPN protocol doesn’t support dial-up links?

A

IPSec

71
Q

How many simultaneous connections does PPTP support?

A

Point-to-point only.

72
Q

How many simultaneous connections does L2F support?

A

Point-to-point only.

73
Q

How many simultaneous connections does L2TF support?

A

Point-to-point

74
Q

How many simultaneous connections does IPSec support?

A

Multiple.