Implementing Network Security 4 Flashcards

0
Q

List common network devices

A

Router. Connects multiple networks using the same protocol
Switch. Has multiple network ports and combines multiple physical network segments into s single logical network. Controls network traffic by creating switched connections containing only the two hosts involved in transmission
Proxy server. Isolated internal networks from the Internet by downloading and storing Internet files on behalf of internal clients.
Firewall. Any software or hardware device that protects a system or network by blocking unwanted network traffic
Load balancer. A network device whose primary function is to spread out the work among devices in a network. Devices perform more efficiently. Data processed faster.
All-in-one security appliance. A single network security device used to perform a number security functions to secure a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
1
Q

List components that make up a network

A

Device. Any Piece if hardware
Media. Connects and carries the data between devices
Network adapter. Hardware that translates the data between the network and a device
Network operating systems. Controls network traffic
Protocol. Set of rules for network communications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a multifunction network device

A

Any piece of network hardware meant to perform more than one networking task without having to be reconfigured.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is an application aware device and give examples

A

A network device that manages the information of any applications that interface with it.
Examples include firewalls, IDS intrusion detection systems, IPS intrusion prevention systems, and proxies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

List router discovery protocols

A

The language that routers use to communicate with each other

RIP. routing information protocol. Distance vector protocol
RIPv2 enhance features
IGRP. interior gateway routing protocol. Distance vector routing protocol
EIGRP. Enhanced interior gateway routing protocol. Proprietary routing protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

List some network analysis tools that function as security measures

A

Sniffer. Monitors network communication and captures data.
Spam filters. Used to read and reject incoming messages that contain known target words and phrases
Protocol analyzer. Diagnostic software that examines and displays data packets being transmitted over a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is IDS

A

Intrusion detection system

A detection control system that scans, audits, and monitors the security infrastructure for signs of attacks in profess.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is NIDS

A

Network intrusion detection system
A type of IDS uses passive hardware sensors to monitor traffic On a specific segment of the network. Cannot analyze encrypted packets because has no method toe decrypt data. Sniffs traffic and sends alerts about anomalies. Can spot a rogue machine.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What’s WIDS

A

wireless IDS
a type of NIDS that scans the radio frequency spectrum for threats to the wireless networks. Primarily roque access points.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is IPS

A

Intrusion prevention system

Has the monitoring capabilities of IDS but actively works to blocks any detected threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is NIPS

A

Network intrusion prevention system
Monitors suspicious network traffic and reacts in Real time to block it by dropping Unwanted data packets of resetting the connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is WIPS

A

Wireless IPS
a type of NIPS that scans the radio frequency spectrum for threats to the wireless network, rogue access points, and can actively block malicious traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Types of network monitoring systems

A

Behavior based monitoring. Learn over time which traffic is and is not allowed with the assistance of admin
Signature based monitoring. Uses a predefined set of rules to id unacceptable traffic
Anomaly based monitoring. Uses a database of unacceptable traffic patterns by analyzing traffic. Creates a performance baseline of acceptable flows.
Heuristic monitoring. Uses known best practices to identify and fix issues

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is VPN

A

Virtual Private Network

Provides secure connections between end points using tunneling to encapsulate and encrypt data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a VPN concentrator

A

A single device that incorporates advanced encryption and authentication methods to handle a large number of VPN tunnels. Geared toward secure remote access or site to site VPNs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a web security gateway

A

A utility used to intentionally block internal Internet access to a predefined list of websites. Configured by administrators to deny access to a specified list of Uniform Resource Locators URLs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a NAC

A

Network Access Control
The collected protocols, policies, and hardware that govern access on device network interconnections.
Provides an additional security layer that scans systems for conformance and allows or quarantines updates to meet policy standards.
Deployed based on three main elements
Authentication method, endpoint vulnerability assessment, and network security enforcement.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is a DMZ

A

a demilitarized zone
A small section of a private network this is located between two firewalls and made available for public access.
Enables clients to access data in private systems without compromising the security of the network as a while

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is a VLAN

A

A Virtual Local Area Network
A point to point logical network that is created by grouping selected hosts together regardless of their physical location.
Uses a switch or router that controls the groups of hosts. Can provide network security by enabling admins to segment groups of hosts within the larger physical network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is subnetting

A

A network design used to divide large networks into smaller logical networks.
Each node is configured with an IP address and a subnet address to create subnetworks and a routing structure. Data flow and security measures can be managed more easily with these smaller scaled networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is NAT

A

Network Address Translation
simple form of Internet security that conceals internal addressing from the public internet. A router is configured with a single public IP address on its external interface and a private non routable address on its internal interface. Translates between the two addresses. Prevents external hosts from identifying and connecting directly to internal systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Describe remote access

A

The ability to connect to network systems and services from offsite or remote location.
Enables authorized users to access and use systems and services through s secure internet connection. Most secure when connecting through a VPN.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is telephony

A

Provides voice communications through devices over a distance.
Common components : VoIP, private branch exchange implementations, CTI computer telephony integration. Incorporates telephone, email, web, and computing infrastructures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Describe virtualization

A

Separates computing software from the hardware it runs via an additional software layer.
Adds flexibility and increases hardware utilization by running multiple OSs on a single computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Describe cloud computing
A method of computing that involves real time communication over large networks to provide the resources, software, data, and media needs of a user. Relies on the Internet to provide computing capabilities anywhere in the world.
25
Cloud computing can be deployed using four basic methods
Private. Distributed by a single company. Hosted internally or off-site Public. Done over the Internet to general consumers Community. Multiple org share ownership of a cloud service Hybrid. Combines two or more deployment methods.
26
The three main services that cloud computing provides
Software. SaaS software as a service. Using cloud to provide applications to users. Platform. PaaS Platform as a Service. Using cloud to provide virtual systems like OSs Infrastructure. IaaS Infrastructure as a Service. Using cloud to provide access to infrastructure needs a client may have. Link data centers
27
Briefly explain the OSI Model
Describes how a network is structured based in how it communicates with other elements in the network Has seven layers with a specific order. Each layer supports the layer above it and is supported by the layer below it. Encourages seamless and consistent communication between different types of network services.
28
Describe the physical layer of the OSI Model
Layer 1. Defines the connections between devices and physical transmission media. Physical connection components: calling and wiring along with hubs, repeaters, switches, and adapters
29
Describe the data link layer of the OSI Model
Layer 2. Provides a link between two directly connected nodes as well as detecting and fixing error in the physical layer Uses PPP point to point protocol G.hn standard that defines telephony networking over power lines and coaxial cables
30
Describe the network layer of the OSI Model
Layer 3. Provides the protocols for transferring data from one node to another in a system with multiple nodes with unique addresses IP ICMP RIP
31
Describe the transport layer of the OSI Model
Layer 4. Controls the reliability of data transmission between nodes in a network for the benefit of the higher layers. TCP UDP SCTP Stream Control Transmission Protocol. Combines the features of TCP and UDP into one protocol
32
Describe the session Layer of the OSI Model
Layer 5. Controls the connections between computers thorough check pointing so that connections when terminated may be recovered. NFS Network File System. Allows clients to access files on a network a if they were assessing local storage Socket Secure SOCKS. Routes data packets on a network through a proxy server and included authentication
33
Describe the presentation layer of the OSI Model
Layer 6. Transforms data into a format that can be understood by the programs in the application layer ICA independent computing architecture. Specified the transmission of data between client and application server
34
Describe the application layer of the OSI Model
Layer 7. Allows client interaction with software by identifying resource and communication requirements HTTP FTP DNS
35
Describe the basic protocols that make up TCP/IP
TCP/IP transmission control protocol / Internet protocol A non proprietary routable network protocol suite that enables computers to communicate over all types of networks IPv4. Uses 32 bit binary address separated by dots into four 8 bit octets assigned to a computer on a TCP/IP network. IPv6. Uses 128 bit binary address. Includes new features such as simplified assess headers, hierarchical addressing, support for time sensitive network traffic and a new structure for unicast addressing. Separated by colons into eight groups of four hexadecimal digits. DHCP. Dynamic Host Configuration Protocol used to automatically assign IP addressing information to IP Network computers.
36
Describe APIPA
Automatic Private IP Addressing Service that enables DHCP client computers to initialize TCP/IP when DHCP is unavailable DHCP clients get IP addresses when the DHCP servers malfunctions when computers have no connectivity. Self allocates addresses randomly from a small range. 169.254.0.1 to 169.254.255.254 Not routable.
37
Describe DNS
The Domain Name System The primary name resolution service on the Internet and private IP networks. A hierarchical system of databases that map computer names to their associated IP addresses.
38
What are the DNS security measures
Placing the DNS server in the DMZ and within the firewall perimeter Setting firewall rules to block incoming non essential services requests Exposing only essential ports Strengthening DHCP filtering Preventing buffers overflows. Using Secure Sockets Layer SSL Keeping the DNS updated regularly with patches issued by the OS vendor. Backing up the DNS and saving the backups in different geographical locations.
39
Describe HTTP
Hypertext Transfer Protocol The TCP/IP protocol that enables clients to connect to and interact with websites. Responsible for transferring the dat on webpages between systems. Defines how messages are formatted and transmitted
40
Describe how to effectively secure web servers
Remove unnecessary services running in the background. Avoid remote access to web servers. Log on locally Store web applications, website logs that contain user info on another secured drive Install security patches regularly Delete or disable unused user accounts. Use the appropriate security tools Use port scanners to scan the web servers regularly.
41
Describe SSL/TLS
Secure Sockets Layer Transport Layer Security Security protocols that combine digital certificates for authentication with public key data encryption. Both protect sensitive communication fro eavesdropping and tampering by using secure, encrypted and authenticated channel over a TCP/IP connection. A server driven process TLS more secure than SSL but few websites implement them
42
Describe HTTPS
Hypertext Transfer Protocol Secure A secure version of HTTPS that supports web commerce by providing a secure connection between a web browser and a server. Uses SSL/TLS to encrypt data.
43
Describe SSH
Secure Shell A protocol used for secure remote login and secure transfer of data. Consists of a server and a client. Encrypted using a variety of methods. Preferred protocol for FTP Used primarily on Linux and Unix systems to access shell accounts. Microsoft does not offer native support. Can be implemented using a third party tool Uses port 22
44
Describe SNMP
Simple Network Management Protocol A service used to collect info from network devices (servers, routers, printers) for diagnostic and maintenance purposes. Two components : management systems and agent software. The agents send info to a SNMP manager which notifies an admin of problems, run a corrective program, store the info for review or ask the agent about a specific network device
45
Describe ICMP
Internet Control Message Protocol An IP network service that reports on connections between two hosts. Used for the ping command that checks for a response from a particular target host. Attackers can use redirected ICMP packets in two ways To flood a router and cause a DoS attack by consuming resources (smirk attack) and to reconfigure routing tables by using forged packets.
46
Describe IPSec
Internet Protocol Security A set of open non proprietary standards used to secure data as it travels across the network or the Internet. Uses an array of protocols and services to provide data authenticity and integrity, anti replay protection, non repudiation, and protection against eavesdropping and sniffing. Operates at the Internet layer of the TCP/IP model Not application dependent.
47
What is iSCSI
Internet Small Computer System Interface A protocol implementing links between data storage networks using IP. Designed to extend across wide area networks without needing any new infrastructure
48
What is a fibre channel
A protocol designed to link data storage across a network and provide remote access over large distances. More expensive option but provides greater performance and reliability Difficult to implement security controls Data may be vulnerable to session hijacking and man in the middle attacks
49
What is FCoE
Fibre channel over ethernet Allows traditional fibre channel protocols to use high speed ethernet networks to transmit and store data Should not be considered a viable alternative for security purposes.
50
Describe telnet
A network protocol that allows a client to initiate remote command access to a host over TCP/IP not encrypted so packets can be intercepted SSH is more secure remote access protocol
51
Describe NetBIOS
Network Basic Inout Output System An interface that allows applications to properly communicate over different computers in a network. Three basic functions Communication over sessions Connectionless communication using datagrams Name registration Attackers can exploit NetBIOS by obtaining info about a system including registered name, IP addresses, and OS. Harden against attack by implementing strong password policies, limit root access on a network share and disable null session capability
52
Name the 6 file transfer protocols
FTP. file transfer protocol. Protocol enables transfer of files between a users workstation and a remote host SFTP. simple FTP. An early unsecured FTP that is obsolete TFTP. trivial FTP. very limited protocol used as an automated process of configuring boot files between machines. Offers no security. Used in local networks not on the Internet FTP over SSH. aka secure FTP uses an SSH tunnel as encryption method SCP. Secure Copy Protocol. Uses SSH to securely transfer files on Unix systems. FTPS. File Transfer Protocol Secure. Known as FTP-SSL. combines the used of FTP with support for SSL/TLS
53
Ports
Well known
54
What is rule-based management
The use of operational rules or restrictions to govern the security of an organizations infrastructure Incorporated into organizational polices disseminates throughout the org
55
methods organizations use to secure the networking infrastructure
``` Flood guard Loop protection Port security Secure router configuration MAC limiting MAC filtering Network separation VLAN management implicit deny Log analysis ```
56
What is flood guarding
Security method Tool used to protect resources from flooding attacks such as DDoS distributed denial of service attacks
57
What is loop protection
A security method that applies proper router configurations | Ex STP
58
What is port security
A security method where admin properly securing ports on a network. Disable unnecessary services Closing ports open by default or have limited functionality Regularly apply appropriate patches Hide responses from ports indicating their status and allow access to pre configured connections only.
59
What is security method of secure router configuration
Ensuring all routers on the network are properly secured and configured.
60
What is MAC Limiting security method
Defining how many different MAC addresses may connect to the network device
61
What is MAC filtering security method
Allowing or denying devices with certain MAC Addresses to connect to a network. Whitelist or blacklist
62
What is network separation security method
Splitting hour network into two or more logically separated networks helps separate critical network functions from lower priority functions
63
What is VLAN management security method
VLAN configuration can be complicated. Use diagrams and documentation to manage security measures
64
What is Implicit deny security methods
Use the principle of implicit deny so that the firewall blocks any traffic it doesn't recognize.
65
What is log analysis security method
Regular monitoring and analysis of security logs helps detects unauthorized intrusion attempts on the network
66
What is unified threat management
UTM Refers to a system that centralizes various security techniques: firewall, anti malware, network intrusion prevention, URL filtering, content inspection, malware inspection into a single appliance Includes single console a security admin can monitor and manage various defense settings. Creates the potential for a single point of failure that could affect an entire network Too much network activity can cause latency issues.
67
The two main categories of antennas
Omni directional send and receive radio waves from all directions Directional transmit signals to a specific point
68
The main two types of omni directional antennas
Rubber duck. Small antenna sealed in a rubber jacket. Have little gain mi deal for mobility. Often used in walkie talkies or other two way radios and short range wireless networks Ceiling dome. Installed in ceilings and used to cover rooms in a building with a wireless signal
69
The four types of directional antennas
Yagi. Used in radio but also employed in long distance wireless networking to extend the range of hotspots. Parabolic. Precise antenna used in satellite dishes. Has significant amount of gain but more difficult to establish a connection Backfire. Small antenna looks similar to parabolic dish but with less gain. Target a specific physical area without overextending coverage Cantenna. Homemade antenna that extends wireless networks or help discover them. Involve placing a metal can over another antenna to increase gain
70
There are various 802.11 standards with different characteristics
802.11 IEEE standard for wireless LAN communications between wireless devices. Specifies wireless data transfer rates up to 2 Mbps in the 2.4 GHz frequency band 802. 11a 802. 11b first called wi-fi. Least expensive. 802. 11g faster. Improvement on b 802. 11n even faster. Improvement on g moved to 5GHz 802. 11ac improves on n. wider channels in 5GHz
71
List the security protocols often used in wireless networking
``` WEP Wired Equivalent Privacy. WTLS Wireless Transport Layer Security 802.1x WPA/WPA2 Wi-Fi Protected Access EAP Extensible Authentication Protocol ; PEAP Protected EAP & LEAP Lightweight EAP ```
72
Describe WAP
Wireless Application Protocol Designed to transmit data such as web pages, email, and newsgroup postings to and from wireless devices over long distances. Uses proprietary WML Wireless Markup Language Has five layers. wireless application environment, Wireless Session Protocol, Wireless Transport Protocol, WTLS, and Wireless Datagram Protocol.
73
Open wireless networks are a major security risk when accessed directly so you should do what to prevent attackers from stealing your data
Use a VPN to tunnel through the network. VPNs provide authentication techniques and encrypts your data in transit over the Internet. The VPN must use secure tunneling protocols such as IPSec as opposed to PPTP
74
What are captive portals
A technique that requires a client attempting to connect to the Internet to authenticate through a web page. Unless the client opens the web page and completes the step their packets are intercepted and will be unable to properly use the Internet. Commonly used by wifi hotspots.
75
What are site surveys
The collection of information on a location including access routes, potential obstacles and best positioning of materials for the purpose of constructing something in the best possible way. Lead to networks and users having quality coverage and bandwidth while being conscious of security protocols and requirements Accomplished by modeling the proposed environment using tools that collect FR signal data