Chapter 4 Securing Your Network Flashcards
Intrusion detection systems (IDSs) and intrusion prevention systems (IPSs) inspect traffic using the same functionality as a protocol analyzer.
A host-based IDS (HIDS) can detect attacks on local systems such as workstations and servers.
The HIDS protects local resources on the host and can detect some malware that isn’t detected by traditional antivirus software. A network-based IDS (NIDS) detects attacks on networks.
A signature-based IDS or IPS uses signatures to detect known attacks or vulnerabilities.
Heuristic-based or behavioral-based IDSs (also called anomaly-based IDSs) require a baseline and detect attacks based on anomalies or when traffic is outside expected boundaries.
A false positive incorrectly raises an alert indicating an attack when an attack is not active. False positives increase the workload of administrators. A false negative is when an attack is active, but not reported.
An IPS is similar to an active IDS except that it’s placed inline with the traffic (sometimes called in-band) and can stop attacks before they reach the internal network.
An IPS can actively monitor data streams, detect malicious content, and prevent it from reaching a network. In contrast, an IDS is out-of-band.
IDSs and IPSs can also protect internal private networks, such as private supervisory control and data acquisition (SCADA) networks.
SSL/ TLS accelerators are dedicated hardware devices that handle Transport Layer Security (TLS) traffic. Other devices, such as a web server, can off-load TLS traffic handling to the accelerator.
SSL decryptors allow an organization to inspect traffic, even when traffic is using SSL or TLS.
A software defined network (SDN) uses virtualization technologies to route traffic instead of using hardware routers and switches. It separates the data and control planes.
Honeypots and honeynets appear to have valuable data and attempt to divert attackers away from live networks. Security personnel use them to observe current attack methodologies and gather intelligence on attacks.
An 802.1x server provides strong port security using port-based authentication. It prevents rogue devices from connecting to a network by ensuring that only authorized clients can connect.
Wireless access points (APs) connect wireless clients to a wired network.
A fat AP, also known as a stand-alone AP, includes everything needed to connect wireless clients to a wireless network.
Thin APs are controller-based APs. A controller configures and manages a thin AP.
The service set identifier (SSID) is the name of the wireless network. Disabling the SSID broadcast hides a wireless network from casual users.
You can restrict access to wireless networks with media access control (MAC) filtering. However, attackers can discover authorized MACs and spoof an authorized MAC address.
Most WAPs have omnidirectional antennas. Directional antennas have narrower beams and longer ranges.
An ad hoc wireless network is two or more devices connected together without an AP.
Wi-Fi Protected Access (WPA) can use Temporal Key Integrity Protocol (TKIP) or Counter Mode Cipher Block Chaining Message Authentication Code Protocol (CCMP). Both WPA and TKIP have been deprecated.
Personal mode uses a pre-shared key (PSK). It is easy to implement and is used in many smaller wireless networks.
Personal mode uses a pre-shared key (PSK). It is easy to implement and is used in many smaller wireless networks.
Open mode doesn’t use a PSK or an 802.1x server. Many hot spots use Open mode when providing free wireless access to customers.
802.1x servers use one of the Extensible Authentication Protocol (EAP) versions, such as Protected EAP (PEAP), EAP-Tunneled TLS (EAP-TTLS), EAP-TLS, or EAP-Flexible Authentication via Secure Tunneling (EAP-FAST).
The most secure EAP method is EAP-TLS, and it requires a certificate on the server and on each of the wireless clients. PEAP
PEAP and EAP-TTLS require a certificate on the server, but not the client. PEAP is often implemented with Microsoft Challenge Handshake Authentication Protocol version 2 (MS-CHAPv2).
LEAP is proprietary to Cisco and does not require a certificate. Cisco designed EAP-FAST to replace Lightweight EAP (LEAP).
A captive portal forces wireless clients to complete a process, such as acknowledging a policy or paying for access, before it grants them access to the network.