Implementing Network Security 4 Flashcards
List common network devices
Router. Connects multiple networks using the same protocol
Switch. Has multiple network ports and combines multiple physical network segments into s single logical network. Controls network traffic by creating switched connections containing only the two hosts involved in transmission
Proxy server. Isolated internal networks from the Internet by downloading and storing Internet files on behalf of internal clients.
Firewall. Any software or hardware device that protects a system or network by blocking unwanted network traffic
Load balancer. A network device whose primary function is to spread out the work among devices in a network. Devices perform more efficiently. Data processed faster.
All-in-one security appliance. A single network security device used to perform a number security functions to secure a network.
List components that make up a network
Device. Any Piece if hardware
Media. Connects and carries the data between devices
Network adapter. Hardware that translates the data between the network and a device
Network operating systems. Controls network traffic
Protocol. Set of rules for network communications
What is a multifunction network device
Any piece of network hardware meant to perform more than one networking task without having to be reconfigured.
What is an application aware device and give examples
A network device that manages the information of any applications that interface with it.
Examples include firewalls, IDS intrusion detection systems, IPS intrusion prevention systems, and proxies.
List router discovery protocols
The language that routers use to communicate with each other
RIP. routing information protocol. Distance vector protocol
RIPv2 enhance features
IGRP. interior gateway routing protocol. Distance vector routing protocol
EIGRP. Enhanced interior gateway routing protocol. Proprietary routing protocol
List some network analysis tools that function as security measures
Sniffer. Monitors network communication and captures data.
Spam filters. Used to read and reject incoming messages that contain known target words and phrases
Protocol analyzer. Diagnostic software that examines and displays data packets being transmitted over a network.
What is IDS
Intrusion detection system
A detection control system that scans, audits, and monitors the security infrastructure for signs of attacks in profess.
What is NIDS
Network intrusion detection system
A type of IDS uses passive hardware sensors to monitor traffic On a specific segment of the network. Cannot analyze encrypted packets because has no method toe decrypt data. Sniffs traffic and sends alerts about anomalies. Can spot a rogue machine.
What’s WIDS
wireless IDS
a type of NIDS that scans the radio frequency spectrum for threats to the wireless networks. Primarily roque access points.
What is IPS
Intrusion prevention system
Has the monitoring capabilities of IDS but actively works to blocks any detected threats.
What is NIPS
Network intrusion prevention system
Monitors suspicious network traffic and reacts in Real time to block it by dropping Unwanted data packets of resetting the connection
What is WIPS
Wireless IPS
a type of NIPS that scans the radio frequency spectrum for threats to the wireless network, rogue access points, and can actively block malicious traffic.
Types of network monitoring systems
Behavior based monitoring. Learn over time which traffic is and is not allowed with the assistance of admin
Signature based monitoring. Uses a predefined set of rules to id unacceptable traffic
Anomaly based monitoring. Uses a database of unacceptable traffic patterns by analyzing traffic. Creates a performance baseline of acceptable flows.
Heuristic monitoring. Uses known best practices to identify and fix issues
What is VPN
Virtual Private Network
Provides secure connections between end points using tunneling to encapsulate and encrypt data.
What is a VPN concentrator
A single device that incorporates advanced encryption and authentication methods to handle a large number of VPN tunnels. Geared toward secure remote access or site to site VPNs
What is a web security gateway
A utility used to intentionally block internal Internet access to a predefined list of websites. Configured by administrators to deny access to a specified list of Uniform Resource Locators URLs.
What is a NAC
Network Access Control
The collected protocols, policies, and hardware that govern access on device network interconnections.
Provides an additional security layer that scans systems for conformance and allows or quarantines updates to meet policy standards.
Deployed based on three main elements
Authentication method, endpoint vulnerability assessment, and network security enforcement.
What is a DMZ
a demilitarized zone
A small section of a private network this is located between two firewalls and made available for public access.
Enables clients to access data in private systems without compromising the security of the network as a while
What is a VLAN
A Virtual Local Area Network
A point to point logical network that is created by grouping selected hosts together regardless of their physical location.
Uses a switch or router that controls the groups of hosts. Can provide network security by enabling admins to segment groups of hosts within the larger physical network
What is subnetting
A network design used to divide large networks into smaller logical networks.
Each node is configured with an IP address and a subnet address to create subnetworks and a routing structure. Data flow and security measures can be managed more easily with these smaller scaled networks.
What is NAT
Network Address Translation
simple form of Internet security that conceals internal addressing from the public internet. A router is configured with a single public IP address on its external interface and a private non routable address on its internal interface. Translates between the two addresses. Prevents external hosts from identifying and connecting directly to internal systems.
Describe remote access
The ability to connect to network systems and services from offsite or remote location.
Enables authorized users to access and use systems and services through s secure internet connection. Most secure when connecting through a VPN.
What is telephony
Provides voice communications through devices over a distance.
Common components : VoIP, private branch exchange implementations, CTI computer telephony integration. Incorporates telephone, email, web, and computing infrastructures.
Describe virtualization
Separates computing software from the hardware it runs via an additional software layer.
Adds flexibility and increases hardware utilization by running multiple OSs on a single computer.
Describe cloud computing
A method of computing that involves real time communication over large networks to provide the resources, software, data, and media needs of a user.
Relies on the Internet to provide computing capabilities anywhere in the world.
Cloud computing can be deployed using four basic methods
Private. Distributed by a single company. Hosted internally or off-site
Public. Done over the Internet to general consumers
Community. Multiple org share ownership of a cloud service
Hybrid. Combines two or more deployment methods.
The three main services that cloud computing provides
Software. SaaS software as a service. Using cloud to provide applications to users.
Platform. PaaS Platform as a Service. Using cloud to provide virtual systems like OSs
Infrastructure. IaaS Infrastructure as a Service. Using cloud to provide access to infrastructure needs a client may have. Link data centers
Briefly explain the OSI Model
Describes how a network is structured based in how it communicates with other elements in the network
Has seven layers with a specific order. Each layer supports the layer above it and is supported by the layer below it.
Encourages seamless and consistent communication between different types of network services.
Describe the physical layer of the OSI Model
Layer 1. Defines the connections between devices and physical transmission media.
Physical connection components: calling and wiring along with hubs, repeaters, switches, and adapters
Describe the data link layer of the OSI Model
Layer 2. Provides a link between two directly connected nodes as well as detecting and fixing error in the physical layer
Uses PPP point to point protocol
G.hn standard that defines telephony networking over power lines and coaxial cables