CISA Refresher 1 Flashcards
It is possible to break LAN security through the dail in route. Without dail up access controls, a caller can dial in and try passwords until they gain acces
TRUE
A dial back modem may be used to prevent access by guessing passwords.
TRUE
Twin line dial back modems
Dial back modems are available that are connected to two individual telephones. one is used for incoming calls and the second is used to call back the user on the known telephone number.
Router packet filtering firewalls
Packet header have information in them, including the IP address of the sender and receiver and the authorized port numbers allowed to use the information transmitted. Base onthat information the router know what kind of internet service, such as web based or FTP, is being used to send the date as well as the identitied of the sender and reciver of the data.
Possible attacks in packet filtering firewalls
IP spoofing, Source routing specification and miniature fragment attack.
Application firewall systems
Disadvantages are poor performance and scalability as internet usage grows
Stateful inspection firewall
It keeps track of the destination IP address of each packet that leaves the organizations internal network. whenever the response to the packet is received its record is referenced to ascertain and ensure that the incoming message is in response to the request that went out from the organization.
problem faced firewall
Most firewalls operate at network layer, therefore they do not stop any application base or input based attack
example of such attacks in application layer
SQL injection, buffer overflow attacks.
components of IDS
Sensors that are responsible for collecting data, Analyzer that receive input from sensors and determine intrusive activity, An administrative control, A user interface
Types of IDS
Signature based, statistical based, and Neural based
Neural based IDS
are similar to statistical model but with added self learning functionality
IDS cannot help following weakness
weakness in policy definition, application level vulnerabilities, back door in the applications, weakness in identification and athentication schemes
Two types of Honey pots
High interactionn , Low interaction
Heuristic scanning tools
are a type of virus scanning used to indicate possible infected codes