Chapter 9 Network Security Implementation Flashcards
a framework for controlling access to computing resources. The remote networking protocols RADIUS, TACACS, TACACS+, and Diameter all have their own implementations
Authentication, Authorization, and Accounting (AAA)
the method of uniquely validating a particular entity or individual’s credentials
Authentication
Authentication Factors:
- Something you know, such as a password
- Something you have, such as a token or access card
- Something you are, including physical characteristics, such as fingerprints or a retina pattern.
- Somewhere you are or are not
- Something you do, for example a keystroke logger that measures how hard you press the keys while typing, or how long the keys remain pressed.
any authentication scheme that requires validation of at least two of the possible authentication factors.
Multifactor Authentication (MFA)
is an authentication scheme that requires validation of two authentication factors.
Two-factor authentication
is a mechanism where a single user authentication provides access to all the devices or applications where the user has permission. The user need not enter multiple passwords each time he wants to access a device.
Single sign-on (SSO)
a directory service protocol that defines how a client can access information, perform operations, and share directory data on a directory server.
Lightweight Directory Access Protocol (LDAP)
an electronic document that associates credentials with a public key. The certificate validates the certificate holder’s identity and is also a way to distribute the holder’s public key.
Certificates
is a popular open-source authentication protocol that is based on a time-sensitive ticket granting system. To use an SSO method in which the user enters access credentials that are then passed to the authentication server, which contains an access list and permitted access credentials.
Kerberos
Kerberos authentication process:
- A user logs on to the domain.
- The user requests a Ticket Granting Ticket (TGT) from the Ticket Granting Service (TGS) on the authenticating server.
- The authenticating server responds with a time-stamped TGT.
- The user presents the TGT back to the authenticating server and requests a service ticket to access a specific resource.
- The authenticating server responds with a service ticket.
- The user presents the service ticket to the resource.
- The resource authenticates the user and allows access.
is a protocol that enables a server to provide standardized, centralized authentication for remote users. only encrypts passwords
Remote Authentication Dial-In User Service (RADIUS)
are authentication protocols that prived centralized authentication and authorization services for remote users. includes process-wide encryption for authenticating, whereas RADIUS encrypts only passwords. uses TCP instead of UDP and supports multiple protocols
Terminal Access Controller Access Control System (TACACS) and (TACACS+)
the backbone of Microsoft’s Remote Desktop system. Its capabilities include data encryption, remote audio and printing, access to local files, and redirection of the host’s disk drives and peripheral ports. Listens on port 3389
Remote Desktop Protocol (RDP)
is a platform-independent desktop sharing system. client and server software is available for almost any operating system
Virtual Network Computing (VNC)
is a general term for the collected protocols, policies, and hardware that govern access on network interconnections. Scans devices for conformance and allows or quarantines updates to meet policy standards
Network Access Control (NAC)
is a standard for securing networks by implementing Extensible Authentication Protocol (EAP) as the authentication protocol over either a wired or wireless Ethernet LAN
IEEE 802.1x
IEEE 802.1x characteristics include:
Employs an authentication service, such as RADIUS, to secure clients.
It is an IEEE standard used to provide a Port-based Network Access Control (PNAC), using the 802.11 protocols.
802.1x uses EAP to provide user authentication against a directory service
a set of data (user names, passwords, time and date, IP addresses, media access control (MAC) addresses, and so on) that is used to control access to a resource such as a device, file, or network.
Access Control List (ACL)
Type of Firewall
the simplest implementation of a firewall and work at the Network Layer (Layer 3) of the OSI model. Are usually part of a router.
Packet Filters
Type of Firewall
work at the Session Layer (Layer 5) of the OSI model by monitoring the condition, or state, of the connection.
Stateful Inspection Firewall
Type of Firewall
work at the Application Layer (Layer 7) of the OSI model and require incoming and outgoing packets to have a proxy to access services. Also known as Application-level gateways.
Proxy Firewalls
combine the functions of a packet filter, a stateful inspections firewall, and a proxy firewall. They operate on all three OSI layers, Network, Session and Application, simultaneously.
Hybrid Firewall
is a network security solution that is used to monitor and manage a wide variety of security-related applications and infrastructure components through a single management console. can be network appliances or a cloud service
Unified Threat Management (UTM)
are protocols that do not expose data and/or credentials in cleartext, so they are less likely to allow for the credentials or data to be viewed and captured by someone else
Secure Protocols
Used for managing devices on IP networks. Version 3 added cryptographic security to secure data and user credentials
Simple Network Management Protocol version3 (SNMPv3)
Protocols that Aren’t Secure:
FTP Telent POP3 IMAP SNMP V1 and V2
Guidelines for Securing Ports and Services
- Determine which ports are currently open
- Determine which of the open ports are required to be open
- Close any ports that are not required to be open
- Determine which services are currently running
- Determine which of the running services are required
- Disable any services which are not required