Lecture 6.5 Flashcards
Technical controls – ?
Identify
Firewalls and VPN
essential
Technical controls – ?
Identify
Firewalls and VPN
essential
Enforcing policy for many ?
Identify
Firewalls and VPN
IT functions
Not involve direct ?
Identify
Firewalls and VPN
human control
Improve organization’s ability to ?
Identify
Firewalls and VPN
balance
?
Use data classification schemes
Identify
Firewalls and VPN - Access Control
Mandatory access control (MAC)
?
Give users and data owners limited control over access
Identify
Firewalls and VPN - Access Control
Mandatory access control (MAC)
?
Each collection of information is rated
Identify
Firewalls and VPN - Access Control
Data classification schemes
?
Each user is rated
Identify
Firewalls and VPN - Access Control
Data classification schemes
?
May use matrix or authorization
Identify
Firewalls and VPN - Access Control
Data classification schemes
?
Managed by central authority
Identify
Firewalls and VPN - Access Control
Nondiscretionary controls
?
Tied to the role a user performs
Identify
Firewalls and VPN - Access Control
Role-based
?
Tied to a set of tasks user performs
Identify
Firewalls and VPN - Access Control
Task-based
?
Implemented at the option of the data user
Identify
Firewalls and VPN - Access Control
Discretionary access controls
?
Used by peer to peer networks
Identify
Firewalls and VPN - Access Control
Discretionary access controls
? ?? ??? ????
(4) All controls rely on
Enumerate
Firewalls and VPN - Access Control
- Identification
- Authentication
- Authorization
- Accountability
Unverified entity – ?
Identify
Firewalls and VPN - Access Control - Identification
supplicant
Seek access to a resource by ?
Identify
Firewalls and VPN - Access Control - Identification
label
?
is called an identifier
Identify
Firewalls and VPN - Access Control - Identification
Label
Mapped to one & only one ?
Identify
Firewalls and VPN - Access Control - Identification
entity
Authentication:
* Something a supplicant ?
* Something a supplicant ??
* Something a supplicant ???
Identify
Firewalls and VPN - Access Control - Authentication
- knows
- has
- is
Matches supplicant to ?
Identify
Firewalls and VPN - Access Control - Authorization
resource
Often uses access control ?
Identify
Firewalls and VPN - Access Control - Authorization
matrix
(3) Handled by 1 of 3 ways
Enumerate
Firewalls and VPN - Access Control - Authorization
- Authorization for each authenticated users
- Authorization for members of a group
- Authorization across multiple systems
Accountability known as ?
Identify
Firewalls and VPN - Access Control - Accountability
auditability
All actions on a system can be attributed to an authenticated ?
Identify
Firewalls and VPN - Access Control - Accountability
identity
System logs and ?
Identify
Firewalls and VPN - Access Control - Accountability
database journals
Prevent information from moving between the ? and ??
Identify
Firewalls and VPN - Firewalls - Purpose
- outside world
- inside world
?
untrusted network
Identify
Firewalls and VPN - Firewalls - Purpose
Outside world
?
trusted network
Identify
Firewalls and VPN - Firewalls - Purpose
Inside world
?
Five major categories
Enumerate
Firewalls and VPN - Processing Mode
- Packet filtering
- Application gateway
- Circuit gateway
- MAC layer
- Hybrids
?
Filtering firewall
Identify
Firewalls and VPN
Packet Filtering
?
Examine header information & data packets
Identify
Firewalls and VPN
Packet Filtering
? ?? ??? ???? ?????
(5) Installed on TCP/IP based network
Enumerate
Firewalls and VPN - Packet Filtering
- Functions at the IP level
- Drop a packet (deny)
- Forward a packet (allow)
- Action based on programmed rules
- Examines each incoming packet
Inspect networks at the ?
Identify
Firewalls and VPN - Filtering Packets
network layer
Packet matching restriction = ?
Identify
Firewalls and VPN - Filtering Packets
deny movement
? ?? ??? ????
(4) Restrictions most commonly implemented in Filtering Packets
Enumerate
Firewalls and VPN - Filtering Packets
- IP source and destination addresses
- Direction (incoming or outgoing)
- Protocol
- Transmission Control Protocol (TCP) or User Datagram Protocol (UD) source or destination
?
Requires rules to be developed and installed with firewall
Identify
Firewalls and VPN - Packet Filtering Subsets
Static filtering
?
Allows only a particular packet with a particular source, destination, and port address to enter
Identify
Firewalls and VPN - Packet Filtering Subsets
Dynamic filtering
?
Uses a state table
Identify
Firewalls and VPN - Packet Filtering Subsets
Stateful
?
Tracks the state and context of each packet
Identify
Firewalls and VPN - Packet Filtering Subsets
Stateful
?
Records which station sent what packet and when
Identify
Firewalls and VPN - Packet Filtering Subsets
Stateful
?
Perform packet filtering but takes extra step
Identify
Firewalls and VPN - Packet Filtering Subsets
Stateful
?
Can expedite responses to internal requests
Identify
Firewalls and VPN - Packet Filtering Subsets
Stateful
?
Vulnerable to DOS attacks because of processing time required
Identify
Firewalls and VPN - Packet Filtering Subsets
Stateful
?
Installed on dedicated computer
Identify
Firewalls and VPN
Application Gateway
?
Used in conjunction with filtering router
Identify
Firewalls and VPN
Application Gateway
?
Goes between external request and webpage
Identify
Firewalls and VPN - Application Gateway
Proxy server
?
Between trusted and untrusted network
Identify
Firewalls and VPN - Application Gateway - 1/4 ?
Resides in DMZ