Lecture 8 Flashcards

1
Q

To ensure proper network security, you need to identify:

A
  • Unobtrusive as possible (not aggressively asking you to re log in?)
  1. What must be protected
  2. From whom – threats within or outside the organization
  3. Cost of security breached – who does it affect, what is the impact of data being lost or stolen
  4. How likely is the treat going to happen – high profile business or threats from competition.
  5. Natural disasters / force majeure
  6. Lock down vs flexibility – overbearing security
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Physical Access security precautions

A
  • Rooms that house servers should be locked and inaccessible to unauthorized persons.
  • Such rooms should have key locks, coded locks or key cards and connected to a system that logs entry and exit.
  • Wires from/to workstations and servers or active devices should be inaccessible to eavesdropping equipment. The use of cable raceways or other channeling devices should be encouraged.
  • Server rooms should be well cooled and have redundant source of power.
  • Where possible remove keyboards, mice, and screens/monitors from server rooms. Instead use remote access or KVM switches.
  • Disable ports on devices, e.g., USB ports or CD/DVD drives
  • Similar processes should be applied for active devices.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Protecting Wireless Network

A
  • Wireless Encryption: Prevents attackers who intercept wireless packets from interpreting the data.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

WPA2 (choose this one)

A

WiFi Protected Access 2 (WPA2) –
* most used standard
* Uses AES (Advanced Encryption Standard) algorithm
* Uses passphrase – password with no spaces.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

WPA3

A
  • WiFi Protected Access 3 (WPA3) –
  • improvement on WPA2.
  • Uses 192-bit encryption
  • Not yet widely used but backward compatible with WPA2
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

WEP

A
  • Wired Equivalent Privacy (WEP)
  • Basic data encryption
  • Discouraged because it is fairly easy to crack * Used on older devices
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

MAC address filtering

A
  • Only allow certain devices based on MAC address to be given an ip
  • Best suited for small networks with fixed number of devices
  • Not suitable for dynamic environment
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

SSID

A
  • Service Set Identifier (SSID) –
  • Label for identifying an AP
  • SSID should not be broadcasted, though not foolproof against experienced hackers
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Intrusion Detection Systems

A
  • Monitor network traffic for malicious packets or patterns.
  • They are passive, i.e., monitor only (and maybe raise alarm) but do not
    filter/block.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Intrusion Prevention Systems

A
  • Unlike IDS, IPS take actions to filter or block malicious traffic.
  • Disabling the port / link
  • Dynamically setting rules to block traffic flow.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Network Data

A
  • Authentication and Authorization
  • Encryption – making data unusable to unauthorized personnel.
  • Use of special devices such as firewalls, intrusion detection and prevention systems, and content filters.
  • Malware protection, e.g., Antivirus
  • Wireless security: protection of wireless networks – range limiting, hidden SSID, strong passwords etc.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Multi-factor authentication

A
  • What the user knows – username + password
  • What the user has or possesses – key card
  • Who the user is – biometric: fingerprint, eye scans etc.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Passwords should be

A
  • Complex – mix of characters: alphanumeric, special symbols.
  • Minimum character count
  • Password aging – length of time before password must be changed
  • Enforce password history – can’t use old / previous password
  • Lock out after X attempts
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

VPN

A
  • Tunnelled connection between sites
  • Allows multiple sites maintain secure connection via the Intern
    et, instead of through dedicated WAN links.
  • Cost saving using the Internet instead of WAN
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Restricted Log in time and locations

A
  • Authorize file and folder access, especially for shared resources.
  • Read only
  • Read + Write
  • Delete + Change
  • Full
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What does the use of Virtual Private Networks (VPN), useful for

A

remote workers or to branch office to HQ.

VPN provide a private tunnel between remote client and server