M9: Firewalls and tunnels, security architecture - C10 Flashcards

1
Q

What is a Firewall?

A

A gateway providing access control and filtering. Thus it can allow, deny or modify any package in either direction through it.

Relates to Complete-Mediation(P4) and Isolated-Compartments(P5)

P. 282

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is an Encrypted Tunnel?

A

Is an encrypted persistet connection between two networks and/or hosts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a Virtual Private Network?

A

Is a private network established over the network. It is maintained by secure communication channels and authentications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are Perimeter-based Defenses?

A

Defenses focused on the edge of the network, such as Firewalls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Why filter inbound packages?

A

Filtering inbound packages protects the internal network from the outside forces

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Why filter outbound packages?

A

To both limit exposed functionality and detect/monitor unauthorized transfers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a package filter Firewall?

A

Also called a Screening Router, it filters packages based on the header information in particular source IP. It often acts as a first line of defence.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the Actions a Package Filter Firewall can take?

A

The primary actions on any given package are
* Allow - allow
* Drop - silently drop
* Reject - drop and inform source
Additionally we may log information about the package.

intelligent pack filtering may involvde content based rules

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a Stateless package filter?

A

A firewall where each package is examined Individually.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a Stateful package filter?

A

A firewall which stores data about prior packets to inform decisions about future packets. It investigates the flow.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a Dynamic package filter?

A

An adaptive statefull package filter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Why should the firewall use allow listing rather than deny listing?

A

P2(Safe Defaults) - motivates that we deny-by-default. Alternatively we would need to enumerate all the baddies and exploits in our deny-list to achieve the same safety, which is impossible.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the connection between Firewall and Security Policy?

A

In a sense the Firewall instantiates the network security policy through its rule set.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the recognized limitations of Firewalls

A

Limitations include
* Topological - is there truly a perimeter?
* Malicious insiders - user/hosts within network may be compromised
* Bad connections - users may inadvertently make visit infected sites
* Tunneling - Filtering based on port number, can be circumvented
* Encrypted Content - Package inspection may be defeated by encrypted content.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a Proxy firewall?

A

Like any proxy it sits between the internal and external network. Ideally all trafic is routed through the proxy, without any knowledge of or impact on the end hosts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a Circuit-level proxy?

A

Facilitates internal and external hosts connecting, seemingly to eachother, but in reality to and through the proxy. This way only allowed connections can be made.

17
Q

What is an Application-level filter?

A

Uses specialized programs for pre-determined applications with deep understanding of protocols to examine and possibly ammend packages.

P. 290

18
Q

What are Proxy Firewall Requirements?

A
  • Transparency - users experience is unchanged
  • Performance - Performance is not degredaded
19
Q

What are the Limitations of Application-Level Filters

A

They require highly specialized programs often implemented in hardware to reduce performance impacts. Thus limited in range to only the most used and most critical of protocols.

20
Q

What is a Bastion Host

A

It is a harded host exposed to the internet on one side and the internal network on the other

21
Q

How can Firewalls provide Defense-in-Depth(P13)

A

By using internal Firewalls we can frustrate attackers who have gained initial access

22
Q

What are the components of a comprehensive Firewall architecture?

A

An outer layer using a perimeter network - DMZ.
It consists of a Bastion host between two Screening Routers (package filters). The routers filter inbound and outbound packages and the Bastion provides more screening such as Application-level filtering

23
Q

What is a WAF?

Web Application Filter

A

An application filter firewall, targeting HTTP and HTTPS

24
Q

What is a DMZ?

Demilitarized Zone

A

Contains our servers in a separately secured environment

25
Q

What is NAT?

Network Address Translation

A

Translates from external IP addresses to internal IP addresses. This can have incidental or secundary security benefits in that if there is no mapping there is no way to connect.

26
Q

Why would we want to limit outgoing pings?

A

Outgoing pings can be used to
* Map the internal network
* Can be used to ping a Command and Control server

27
Q

What security principles should we practice with out perimeter defense?

A
  • Defence in Depth
  • No Single Point of Failure
  • Segmentation
  • Deny by Default
28
Q

Where to encrypt?

A

Can encrypt Transportation layer with TLS.
Applications can also encrypt their communication to increase security.

29
Q

Transport mode vs Tunnel mode?

A

Transport mode encrypts end to end.
Tunnel encrypts network to network.
There are security tradeoff between them.

30
Q

Why dont we aways use Tunnel Mode?

A
  • Difficult - Difficult to setup and keep running with rapidly changing internel infrastructure
  • Inspection - internally encrypted data makes surveilance difficult
31
Q

Why use advanced servers?

Advanced as in placed further forward

A

They allow us to segregate critical data from exposed data.

32
Q

Why are Perimeter Defences less applicable now?

A

There is less and less a clear cut perimeter, and trusting hosts on the network is outdated.

33
Q

What is Zero-Trust?

A

A new paradigm in security, where we assume that everyone/everything is compromised.

34
Q

What is OT?

Operational Technology

A

Runs all the physical stuff like machines.

35
Q

What is the purdue model?

A

A layered security model between IT systems and OT systems.

36
Q

Why are OT systems not always updated?

A
  • Often the money maker of the company.
  • If it aint broke
  • Often manual process