LESSON5 Flashcards
is the protection of the underlying networking
infrastructure from unauthorized access, misuse, or theft.
Network Security
involves creating a secure infrastructure for devices, users, and applications to work in a secure manner.
Network Security
Network security combines _______ at the edge and in the network.
multiple layers of defenses
Each network security layer implements ________.
policies and controls
_______ gain access to network resources, but ________ are blocked from carrying out exploits and threats.
Authorized users ; malicious actors
How does network security work?
- Network security combines multiple layers of defenses at the edge and in the network.
- Each network security layer implements policies and controls.
- Authorized users gain access to network resources, but malicious actors are blocked from carrying out exploits and threats.
- Is an organization’s set of rules regarding how to handle and protect sensitive data
(Ps A S R D W Phs)
Physical security
Acceptable use of applications
Safeguarding data
Remote access to the network
Data center
Wireless security
Protecting the Hardware and Software
- Malicious programs that have many different capabilities.
Malware
Types of Malware ( V W B P R R R T )
Virus
Worm
Botnets
Polymorphic
Ransomware
Remote Administration Tools (RATs)
Rootkits
Trojan
Programs that copy themselves throughout a computer or network.
- Virus –
Self-replicating viruses the exploits security vulnerabilities to automatically spread themselves across the computers and networks.
- Worm –
Short for “robot network,” these are networks of infected computers under the control of single attacking parties using command and control servers.
- Botnets –
Is a type of malware with the capacity to “morph” regularly, altering the appearance of the code while retaining the algorithm within.
- Polymorphic –
Is a criminal business model that uses malicious software to hold valuable files, data or information.
- Ransomware –
Software that allows a remote operator to control a system. These tools were originally built for legitimate use, but are now used by bad actors.
- Remote Administration Tools (RATs) –
Programs that provide privileged (root-level) access to a computer. _____ vary and hide themselves in the operating system.
- Rootkits –
Malware disguised in what appears to be legitimate software.
- Trojan –
- The primary method of keeping bad actors out of a network.
Firewalls
- Placed between a private LAN and the public Internet.
Firewalls
- Can be a hardware device or it can be software.
Firewalls
- Can filter packets based on source address, destination address, port numbers, and other criteria.
Firewalls
Firewall Topologies (B D D)
- Bastion host topology
- Dual-homed bastion
- Demilitarized zone(DMZ)
consists of a packet filtering router that forwards all incoming packets to the firewall software on a bastion host. Through this topology, the firewall is placed between the internet and the internal network segment.
Once the firewall is compromised, there is no impediment for the attacker to access the protected network.
- Bastion host topology–
It has two network adapter cards in it and two IP addresses, one for each network it is connected to.
- Dual-homed bastion–
consists of two packet filtering routers that is most secure firewall solution.
- Demilitarized zone(DMZ) –
-Classify IP packets and filters that enable network administrators to control which routing updates or packets are permitted or denied in or out of a network and provide extra security for the network.
Access Control List
PORTS Number (20 -161)
20 TCP UDP
21 TCP
23 TCP UDP
25 TCP
53 TCP UDP
67 and 68 UDP
69 UDP
80 TCP
109 TCP
110 TCP
161 UDP
20 TCP UDP
FTP data transfer
21 TCP
FTP control (command)
23 TCP UDP
Telnet protocol
25 TCP
Simple Mail Transfer Protocol (SMTP)
53 TCP UDP
Domain Name System (DNS)
67 and 68 UDP
Dynamic Host Configuration Protocol (DHCP)
69 UDP
Trivial File Transfer Protocol (TFTP)
80 TCP
Hypertext Transfer Protocol (HTTP)
109 TCP
Post Office Protocol v2 (POP2)
110 TCP
Post Office Protocol v3 (POP3)
161 UDP
Simple Network Management Protocol (SNMP)