Exam 2 (Material from Chapters 5 - 9ish) Flashcards
What are the layers of the OSI model?
Layer 7: Application
Layer 6: Presentation
Layer 5: Session
Layer 4: Transport
Layer 3: Network
Layer 2: Data Link
Layer 1: Physical
Explain the function of each layer of the OSI model?
Layer 7: Application - User interface
Layer 6: Presentation - Data format; encryption
Layer 5: Session - process-to-process communication
Layer 4: Transport - end-to-end communication
Layer 3: Network - routing data; logical addressing; WAN delivery
Layer 2: Data Link - Physical addressing; LAN delivery
Layer 1: Physical - Signaling
What is the difference between a WAN and a LAN?
Wide area networks (WANs)
- Connect systems over a large geographic area
Local area networks (LANs)
- Provide network connectivity for computers located in the same geographic area
What are some WAN Connectivity Options?
Cable modem
Digital subscriber line (DSL)
Fiber optics
Satellite
Dialup
Cellular 3G/4G/5G networks
What is the Ethernet standard?
- Defines how computers use Media Access Control (MAC) addresses to communicate with each other on the network
- Governs both the Physical and Data Link layers of the OSI Reference Model
What is a hub?
- Contain a number of plugs, or ports, where you can connect Ethernet cables for different network systems
- Echo incoming packets to all ports
What is a switch?
- Perform intelligent filtering
- Know the MAC address of the system connected to each port
- When a switch receives a packet on the network, they look at the destination MAC address and send the packet only to the port where the destination system resides
What is a virtual LAN?
- A collection of logically related network devices that are viewed as a partitioned network segment
- Give administrators the ability to separate network segments without having to physically separate the network cabling
- Can be used to isolate logical groups of devices to reduce network traffic and increase security
Transmission Control Protocol/Internet Protocol (TCP/IP) and How It Works
- A suite of protocols that operate at both the Network and Transport layers of the OSI Reference Model
- Governs all activity across the Internet and through most corporate and home networks
- Developed by the Department of Defense to provide a highly reliable and fault-tolerant network infrastructure (security was not a focus)
Internet Protocol version 4 (IPv4) addresses
are how many bytes long?
Four bytes or 32bits
Internet Protocol version 6 (IPv6) addresses
are how many bits long?
128 bits
Are IPv4 or IPv6 addresses more secure?
IPv6
What is DHCP?
Dynamic Host Configuration Protocol (DHCP)
- Allows each computer to get its configuration information dynamically from the network instead of manually
- Provides a computer with an IPv4 address, subnet mask, and other essential communication information
What is port 20?
File Transfer Protocol (FTP) data transfer
What is port 21?
File Transfer Protocol (FTP) control
What is port 22?
Secure Shell (SSH)
What is port 25?
Simple Mail Transfer Protocol(SMTP)
What is port 53?
Domain Name System(DNS)
What is port 80?
Hypertext Transport Protocol (HTTP)
What is port 110?
Post Office Protocol v3 (POP3)
What is port 139?
Network Basic Input/Output System (NetBIOS) Session Service
What is port 143?
Internet Message Access Protocol (IMAP)
What is port 443?
HTTP over Secure Sockets Layer (SSL)
What is port 989?
File Transfer Protocol over SSL/Transport Layer security (FTPS) for data
What is port 53?
Domain Name Service (DNS)
What is port 990?
File Transfer Protocol over SSL/Transport Layer security (FTPS) for control
What is port 161?
Simple Network Management Protocol (SNMP)
What is ICMP?
Internet Control Message Protocol (ICMP)
- A management and control protocol for IP
- Delivers messages between hosts about the health of the network
Attackers can use ICMP to create a _____ attack against a network
denial of service (DoS)
What tools use ICMP?
Ping and Traceroute
- Ping sends a single packet to a target IP address (ICMP echo request)
- Traceroute uses ICMP echo request packets to identify the path that packets travel through a network
What is reconnaissance?
The act of gathering information about a network for use in a future attack
What is Eavesdropping?
When an attacker taps the data cable to see all data passing through it
What is DoS
Flooding a network with traffic and shutting down a single point of failure
What is Distributed DoS (DDoS)?
Uses multiple compromised systems to flood the network from many different directions
Telephony denial of service (TDoS)
Attempts to prevent telephone calls from being successfully initiated or received by some person or organization
What are three basic Network Security Defense tools?
- Firewalls
- VPNs
- Network access control (NAC)
What is a firewall?
A firewall controls the flow of traffic by preventing unauthorized network traffic from entering or leaving a particular portion of the network
What are three important firewall security features and explain them.
Flood guard
Loop protection
Network segmentation
Flood guard: Rules can limit traffic bandwidth from hosts, reducing the ability for any one host to flood a network
Loop protection: Firewalls can look at message addresses to determine whether a message is being sent around an unending loop (for example, from another form of flooding)
Network segmentation: Filtering rules enforce divisions between networks, keeping traffic from moving from one network to another
What are three types of firewalls?
Packet filtering
Stateful inspection
Application proxy
What are four firewall deployment techniques?
Border firewalls
Screened subnet (or demilitarized zone [DMZ]) firewalls
Multilayered firewalls
Unified threat management
*Images of these in Chapter 5 slides number 25-26
What are URL filters?
Filters web traffic by examining the Uniform Resource Locator (URL) as opposed to the IP address
What is content inspection?
The device looks at some or all network packet content to determine if the packet should be allowed to pass
What is Malware inspection ?
A specialized form of content inspection, the device looks at packet content for signs of malware
What are some major VPN technologies in use today?
Point-to-Point Tunneling Protocol (PPTP)
Secure Sockets Layer (SSL)/ Transport Layer Security (TLS)
Secure Socket Tunneling Protocol (SSTP)
Internet Protocol Security (IPSec)
OpenVPN
What is a NAC?
Enables you to add more security requirements before allowing a device to connect to your network
Performs authentication and posture checking
IEEE 802.1x standard governs how clients may interact with a NAC device to gain entry to the network
What is SIP?
Securing Session Initiation Protocol
Voice and Video in an IP Network
Securing Session Initiation Protocol (SIP) and Voice over IP (VoIP)
- Patch all SIP/VoIP software and network component firmware
- Use virtual LANs (VLANs) to separate voice and video from other network use (i.e., workstations and printers)
- Enforce encrypted VPN use for all remote access (including SIP/VoIP)
- Require end-to-end encryption for all voice or video calls using TLS or Secure Real-Time Transport Protocol (SRTP)
- Enforce strong authentication for all network users
- Use firewalls to protect all SIP/VoIP devices and services
- Harden all SIP/VoIP devices and software
What are WAPs?
Wireless access points(WAPs)
A radio that sends and receives networking information over the air between wireless devices and the wired network
- Anyone with a wireless device who is within radio range of a WAP can communicate with and attempt to connect to the network via the device
- Anyone within radio range of wireless network can capture all data sent on that network if not encrypted
Additional Wireless Security Techniques: Hardware
Antenna types
Antenna placement
Power-level controls
Captive portals
Site surveys
Wireless Network Security Controls
VPN over wireless
Wireless encryption
WEP (insecure and flawed)
Counter Mode Cipher Block Chaining Message Authentication Code Protocol (CCMP)
Wi-Fi Protected Access (WPA), WPA2, WPA3
Service set identifier (SSID) broadcast
MAC address filtering
What is an Access Control?
The process of protecting a resource so that it is used only by those allowed to use it
Prevents unauthorized use
Mitigations put in place to protect a resource from a threat
What is the Four-Part Access Control?
Identification
Authentication
Authorization
Accountability
Identification - Who is asking to access the asset?
Authentication - Can their identities be verified?
Authorization - What, exactly, can the requestor access? And what can they do?
Accountability - How are actions traced to an individual to ensure the person who make data or system changes can be identified?
Policy definition phase
Who has access and what systems or resources can they use?
Tied to the authorization phase
Policy enforcement phase
Grants or rejects requests for access based on the authorizations defined in the first phase
Tied to identification, authentication, and accountability phases
What are the two types of access controls?
Physical and Logical
Physical: Controls entry into buildings, parking lots, and protected areas
Logical: Controls access to a computer system or network
A smart card is an example of what type of access control?
physical
Explain Logical Access Controls
Deciding which users can get into a system
Monitoring what each user does on that system
Restraining or influencing a user’s behavior on that system
The Security Kernel
Enforces access control for computer systems
Central point of access control
Implements the reference monitor concept
Mediates all access requests
Permits access only when appropriate rules or conditions are met
- Image of this on slide 10 of chapter 6
What are the four central components of access controls?
Users: People who use the system or processes (subjects)
Resources: Protected objects in the system
Actions: Activities that authorized users can perform on resources
Relationships: Optional conditions that exist between users and resources
What is authorization?
The process of deciding who has access to which resources
In most organizations, authorization is based on what?
job roles
background screening
and government requirements
Conditions or policies are decided by what?
Individual users (user is assigned privileges; most detailed and difficult to maintain)
Group membership policy
Authority-level policy
What are some methods used for identification?
Username
Smart card
Biometrics
What are some guidelines for identificaiton?
Nonrepudiation
Accounting
What are some processes and requirements for authentication?
Knowledge: Something you know
Ownership: Something you have
Characteristics: Something unique to you (something you are)
Action/performance: Something you do/how you do it
Behavior: Some observable trait or behavior that is unique to you
Location: Somewhere you are
Relationship: A trusted individual with whom you have a relationship/someone you know
Authentication by Knowledge examples
Password
- Weak passwords easily cracked by brute-force or dictionary attack
- need password best practices
Passphrase
- Stronger than a password
Authentication by Ownership
Synchronous token
- Calculates a number at both the authentication server and the device
– Time-based synchronization system
– Event-based synchronization system
– Continuous authentication
Asynchronous token
- Uses challenge-response technology
– Key-fob sized device
– Token software installed on a validated mobile device
– USB token
– Smart card
*image of this on slide 17 on chapter 6 slides
Authentication by Characteristics/Biometrics
Static (physiological) measures
What you are
Examples: Fingerprint patterns, iris granularity, retina blood vessels
Dynamic (behavioral) measures
What you do
Examples: Voice inflections, keyboard strokes, signature motions
What are some concerns surrounding biometrics?
- Accuracy
- Acceptability
- Reaction time