CISSP Domain 4: Assessing and Implementing Secure Principles in Network Architectures Flashcards
What’s Keep it Simple?
- complexity is the worst enemy of security
- best-in-suite over best-in-breed solutions are one approach used to simplify defense in-depth
- simplicity helps to avoid configuration mistakes
- enables organizations to move forward improving incrementally, rather than demanding perfection
What does Best-in-Suite mean?
- a software solution that offers a comprehensive and integrated set of functionalities within a single package or suite
- a software vendor strives to deliver a cohesive and unified solution where different modules or components seamlessly work together
What does Best-in-Breed mean?
- software approach that focuses on selecting and integrating individual software applications or solutions that are considered the best or most specialized in their respective domains
- prioritizes functionality and performance over integration and consolidation
Which IEEE standard defines bluetooth?
802.15
What type of network architecture is bluetooth?
Personal Area Network (PAN)
How are connections set up with bluetooth?
with pairing where primary device scans the 2.4 GHz radio frequencies for available devices
What mechanism prevents accidental pairing?
4 digit code (often 0000)
What’s bluejacking?
- annoyance where pranksters push unsolicited messages to engage or annoy other nearby bluetoth users by taking advantage of a loophole in the technology’s messaging options
What’s bluesnarfing?
- data theft
- thieves wirelessly connect to some early bluetooth enabled mobile devices without the owner’s knowledge to download and/or alter phonebooks, calendars or worse
What’s bluebugging?
- attack that grants hackers remote control over he feature and functions of a bluetooth device
- could include the ability to turn on the microphone to use the phone as an audio bug
How do wireless networks announce their SSID on a regular basis?
broadcast with a beacon frame
Hiding SSID is considered which security technique?
security through obscurity
What does SSID stand for?
Service Set Identifier
What is TKIP and what does it stand for?
- Temorary Key Integrity Protocol
- designed to replace WEP without the need to replace legacy hardware
What was TKIP implemented to?
802.11 wireless networking under the name WPA (WI-Fi Protected Access)
What’s CCMP?
- Counter Mode with Cipher Block Chaining Message Authentication Code Protocol
- uses AES 128
- created to replace WEP and TKIP (WPA)
- used with WPA2, which replaced WEP and WPA
What’s Fibre Channel?
a form of network data storage solution (SAN) or NAS, that allows for high-speed file transfers
What’s Fibre Channel Over Ethernet (FCoE)?
used to encapsulate Fibre Channel communication over Ethernet networks
What’s iSCSI
- stands for Internet Small Computer System Interface
- networking storage standard based on IP
What’s Site Survey?
process of investigating the presence of strength and reach of wireless access points deployed in the environment
What does EAP stand for?
Extensible Authentication Protocol.
What’s PEAP?
- encapsulates EAP methods with a TLS tunnel that provides authentication and potenially encryption
- P stands for Protected
What’s LEAP?
- Cisco’s proprietary alternative to TKIP and WPA
- developed to address deficincies in TKIP before 802.11i/WPA2 system was ratified as a standard
What are different antena types? (7)
- monopole
- panel
- dipole
- loop
- cantenna
- yagi
- parabolic
What is loop antenna used for and how does it receive signal?
- used for TV and RFID systems
- omnidirectional if horizontally mounted
What is monopole antenna used for and how does it receive signal?
- can send and receive signals in all directions perpendicular to the line of the antenna itself
- used with wifi routers
What is dipole antenna used for and how does it receive signal?
- omnidirectional antenna essentially composed of two monopoles
- generates powerful signal in restricted space
What is panel antenna?
flat devices that focus from only one side of the panel
What is parabolic antenna?
used to focus signals from very long distances or weak sources
What is yagi antenna?
crafted from straight bar with cross sections to catch specific radio frequencies in the direction of the main bar
What is cantenna antenna?
- constructed from tubes with one sealed end
- focus along the direction of the open end of the tube
What are examples of some of the private circuit technologies?
- PPP
- SLIP
- ISDN
- DSL
- dedicated or leased lines
What are examples of packet switching WAN technologies
- use virtual circuits - efficient and cost effective
- X.25, Frame Relay
- Asynchronous Transfer Mode (ATM)
- Synchornous Data Link Control (SDLC)
- High-Level Data Link Control (HDLC)
What’s a circuit-level firewall?
- firewall that operates at the session layer (Layer 5) of the OSI model
- works by monitoring the TCP handshaking process between two network endpoints (usually a client and a server) without inspecting the contents of the actual data being transmitted
What’s the main function of a circuit-level firewall?
- establish and manage network connections or sessions between internal and external networks
- ensures that the connections are legitimate and authorized based on a set of predefined rules
- once a connection is established, the circuit-level firewall creates a virtual circuit, or “stateful connection,” allowing subsequent packets to pass through without further inspection. It maintains information about the state of the connection, including source and destination IP addresses, ports, and connection status
Do circuit-level firewalls inspect content?
they do not inspect the content of the data packets, making them less effective at detecting and blocking specific types of attacks or malicious activities
What’s an example of a circtuit-level firewall?
SOCKS (Socket Secure)
What’s deep packet inspection?
packet inspection that inspects and filters both the header and payload of a packet that is transmitted through an inspection point
Describe IDS
- analyzes whole packets - both headers and payload, looking for known events
- when a known event is detected, a log message is generated
- reports and alerts
Describe IPS
- analyzes whole packets - both headers and payload, looking for known events
- when a known event is detected, packet is rejected
- blocks
What’s Behavior Based IDS?
- creates a baseline of activity to identify normal behavior and then measures system performance against the baseline to detect abnormal behavior
- can detect unknown attack methods
What’s Knowledge Based IDS?
- uses signatures similar to the signature definitions used by ant-malware software
- only effective against known attacke methods
What’s a bastion host?
computer or appliance that is exposed on the internet and has been hardened by removing unnecessary elemets such as services, programs, protocols and ports
What’s Screened Host?
firewall-protected system logically positioned just inside a private network
What’s screened subnet?
similar to the screened host in concept, except a subnet is placed between two routers or firewalls and the bastion host(s) is located within that subnet
What’s the purpose of Honeypot?
- only entice, not entrap
- attackers shouldn’t be able to download items with enticement
- allowing to download a fake payroll file would be entrapment, which has different implications with law enforcement
What’s the goal of Honeypot?
distract attackers from real assets and isolate in a padded cell until they can be tracked down
What’s Zigbee?
low-power, low-data-rate wireless communication standard designed for applications in home automation, industrial automation, and sensor networks
What are the frequency bands of Zigbee?
2.4 GHz or sub-GHz frequency bands
What are the priorities of Zigbee?
- efficient energy consumption
- long battery life
- device interoperability
What are Zigbee security risks?
- weak encryption or insecure key management
- unauthorized device pairing
- network vulnerabilities
What does Li-Fi stand for?
Light Fidelity
What does Li-Fi use to transmit data?
- visible light or infrared signals
- leverages light-emitting diodes (LEDs) to transmit data by modulating the light intensity at high speeds
What are advantages of Li-Fi?
- high data rates
- increased security
- resistance to electromagnetic interference
What are disadvantages of Li-Fi?
- limited range
- requires a direct line of sight (cannot penetrate walls)
What are the main advantages of satellite communication?
- communication over long distances
- enables connectivity in areas where traditional terrestrial networks may not be available or practical
What is the download speed range for 5G?
gigabits per second (Gbps)