Messer - 4. Network Security Flashcards
What is tamper detection?
A feature on devices such as computers and servers that notifies you if the case is opened. Should be enabled in BIOS settings. Allows systems to monitor themselves.
Foil asset tags are also available. If tag is removed, a message is left behind on the device.
TACACS stands for _________.
Terminal Access Controller Access-Control System
pronounced “tack acks”
What is TACACS?
A remote authentication protocol similar to RADIUS that uses the AAA framework (i.e. Authentication, Authorization, Accounting).
First used to control access to dial-up lines to ARPANET (ancient precursor to the Internet).
[See AAA and RADIUS in Infrastructure section]
What is XTACACS?
Extended TACACS
A proprietary Cisco-created version TACACS that provides additional support for accounting and auditing.
What is TACACS+?
Latest version of TACACS. (If you’re using TACACS today, this is probably what you’re using.) Often associated with Cisco, but available for many different OSes. Uses similar topology as RADIUS, but encrypts ALL information between client and server, whereas RADIUS only encrypts password.
SSO stands for ________.
Single Sign-On
What is Single Sign-On (SSO)?
An authentication scheme that allows a user to log in with a single ID and password to any of several related, yet independent, software systems. True single sign-on allows the user to log in once and access services without re-entering authentication factors.
(e.g. If you’re managing a group of switches and routers, you don’t have to log in to each separate device)
[See: Kerberos]
[Reminds me of PTSEM’s website. Had to log in separately for email, library, etc.]
What is Kerberos?
A network authentication protocol that offers single sign-on (SSO) functionality, which enables a user to log in to a system and access multiple resources without needing to repeatedly reenter username and password. Not only is this easier and less time-consuming for users, but makes network more secure because eliminates need to constantly send security credentials over a network.
It works by issuing cryptographic tickets when someone properly signs in, which can then be shown to other resources on the network. Uses mutual authentication (i.e. with both client and server) to protect against man-in-the-middle or replay attacks.
Used by Microsoft since Windows 2000, and used in Active Directory. But non-proprietary and cross-platform. However, does not work with every device. i.e. if your switches aren’t Kerberos-friendly, you may need to use a different authentication method.
What is Active Directory?
A Microsoft product used to centrally organize IT assets like users, computers, and printers. Allows IT admins to group people together and manage access to various devices, and provide single-on access to those devices (with the help of Kerberos). Integrates with most Microsoft Office and Server products. Uses Offers LDAP support to allow LDAP-based applications to work with an existing Active Directory environment.
LDAP stands for ________.
Lightweight Directory Access Protocol
What is Lightweight Directory Access Protocol (LDAP)?
A protocol for accessing and querying directory services systems. In the context of the N+, these directory services systems are most likely to be based on UNIX or Microsoft Active Directory. Although LDAP supports command-line queries executed directly against the directory database, most LDAP interactions are via utilities such as an authentication program (network logon) or locating a resource in the directory through a search utility.
LDAP is a derivative of the ______ protocol, also known as _______. The main advantage of LDAP is that it’s _______.
X.500
DAP
lightweight (duh)
What is local authentication? And what are its advantages and disadvantages?
Authentication done locally on a machine by an operating system using values / credentials stored within it. i.e. An alternative to using a centralized authentication server or service. Basically the opposite of technologies that use AAA Framework (e.g. Radius, TACACS, Kubernetes).
The advantage is that it works if there’s no Internet connectivity, or if the AAA server is unavailable. Functions as a backup that allows you to still access routers, switches, firewall, etc.
The downside, of course, is that by not using a centralized database, it’s difficult to scale. All changes must be made across individual devices.
PKI stands for ______.
Public Key Infrastructure
What is PKI?
A collection of software, standards, and policies combined to govern the issuance of digital certificates to protect sensitive data, provide unique digital identities for users, devices and applications and secure end-to-end communications. Uses a public and private cryptographic key pair obtained and shared through a trusted authority.
[Not sure how much we really need to know about PKI. It’s only listed in glossary of exam objectives. But I feel like it’s important to understand Certificates, which are definitely in objectives. Messer is pretty weak on this topic]
Explain how PKI’s encryption works.
PKI uses asymmetrical encryption, which basically just means you have two mathematically / algorithmically related keys.
If we use a public key to encrypt something, only the private key can decrypt it. This is great for secret correspondence. Just hand out the public key, and people can send us communication that only we can decrypt
But if I understand properly, we can also use the private key to encrypt something. And anyone can use the public key to decrypt it. Because we’re the only ones who can encrypt a message that the public key can decrypt, we’re able to prove our identity. So this would be helpful for digitally signing a document.
[Note: This is my own understanding based on looking at a few resources. Messer did not cover this at all]
What are four important components of a PKI?
Certificates
Certificate Authorities (CAs)
Certificate Templates
Certificate Revocation List (CRL)
What are certificates?
Electronic credentials that validate users, computers, or devices on the network. A digitally signed statement that associates the credentials of a public key to the identity of the person, device, or service that holds the corresponding private key.
ex. Certificates can be stored on laptop or thumb drive, then accessed during log-in process. They can also be on smart cards, which you can slide into a computer for access (along with PIN.)
What are Certificate Authorities (CAs)?
Issuers and managers of certificates. They validate the identity of a network device or user requesting data. CAs can be either independent third parties, known as public CAs, or they can be organizations running their own certificate-issuing server software, known as private CAs.
What are Certificate Templates?
Templates used to customize certificates issued by a certificate server. This customization includes a set of rules and settings created on the CA and used for incoming certificate requests.
[Don’t really get this one]
What is a Certificate revocation list (CRL)?
A list of certificates that were revoked before they reached the certificate expiration date. Certificates are often revoked because of security concerns, such as a compromised certificate.
What are the five possible factors in Multi-Factor Authentication? Give examples.
Something you know (e.g. password, pin, wipe pattern)
Something you have (e.g. smart card, dongle, USB token, phone)
Something you are (e.g. biometrics, fingerprint, voice, iris scan, gait)
Something you do (e.g. handwriting analysis, typing technique)
Geolocation (e.g. IP address, geolocation)
NAC stands for _________.
Network Access Control
Cisco calls their flavor Network Admission Control
What is Network Access Control (NAC)? Describe how it works.
A standardized approach for verifying that a node (i.e. device) meets certain minimum security criteria before it is allowed on a network. Certain advanced Cisco devices (e.g. switches and routers) use a feature called ‘posture assessment’ to do this. Includes checking for things like type and version of anti-malware, type and version of OS, level of QoS, presence of digital certificates, presence of keyloggers, whether machine is real or virtual, etc.
If everything checks out, host will be granted access to production network. Otherwise, host can be denied access, or quarantined on a non-production network.
The criteria to be assessed is gathered by a NAC agent, a piece of software that sits on the device being assessed.
What is 802.1X?
- 1X is a port-based authentication network access control (PNAC) mechanism. Available for wired networks, VPNs, and wireless access points. [But mainly used for wireless??] It’s a complete authentication standard designed to force devices to go through a full AAA process to get anywhere past the interface on a gateway system. Before 802.1X, a system on a wired network could always access another system’s port. Granted, an attacker wouldn’t be able to do much until he gave a user name/password or certificate, but he could still send packets to any computer on the network.
- 1X worked hard to use already existing technologies. For wired connections, 802.1X commonly uses RADIUS as an authentication server. However, other AAA authentication servers can be used, such as LDAP and TACACS+.
802.1X combines RADIUS-style AAA with EAP (for password encryption, I assume). The folks who developed 802.1X saw it as
a total replacement for every other form of authentication (even Kerberos), but according to Meyers, only wireless networking broadly adopted 802.1X.
Allows for administratively disabling unused ports / interfaces. And for duplicate MAC address checking to prevent spoofers trying to get around NAC.
[Btw, Prof. Messer says a capital letter like ‘X’ in an IEEE standard indicates that it’s a standalone standard, Lower-case letters identify amendments / supplements / revisions to existing standards. e.g. WiFi standards like 802.11g]
When using wired 802.1X, what is a supplicant, control, port and authenticator?
supplicant - The device (or a client on that device?) that is attempting to connect to a protected network and that requires authenticating
control port - The port that a supplicant is plugged into, and that ultimately controls access to the network
authenticator - the switch that is set up for 802.1x
[Messer says there’s also usually an authentication / AAA server on the back-end.]
What is port security?
A form of access control that restricts specific MAC addresses OR a specific number of MAC addresses on a physical port. Commonly implemented by network admins to mitigate the threat of end users plugging in hub, switches, or wireless access ports (WAPs) to extend switching of a single port.
What is MAC filtering?
A form of access control that restricts or allows specific MAC addresses (i.e. the unique hardware address of every device) to be forwarded by a switch or wireless access point.
Zacker book says MAC filtering is a very effective method of security, because of the difficulty an attacker has identifying specific MAC addresses that are specifically allowed to be forward by a switch or WAP.
Messer disagrees. Says it’s easy to find working MAC addresses through packet captures and that MAC addresses can be spoofed. Says anyone who knows a working MAC address can easily circumvent filter. Calls this security through obscurity.
[NOTE: Wireless Access Points (WAPs) use an access control list (ACL) to whitelist or blacklist MAC address
What is a captive portal?
A method of redirecting users who connect to wireless or wired systems to a portal for login or agreement to the acceptable use policy (AUP). Using a captive portal is common for wireless system access. (e.g. hotels, airports, but also common for corporate access to an organization’s wireless network)
ACL stands for _______.
Access Control List
What is an Access Control List (ACL)?
A list of rules either permitting or denying different pieces of traffic from entering (ingress) or leaving (egress) a network. The general idea is that a router, switch, or firewall receives a packet and then typically allows or denies the packet based on the source or destination IP address (IP filtering), or the source and destination port (port filtering). Can also be based on protocols being used (e.g. TCP, UDP, ICMP, IP).
What are the two main components of wireless network security?
Encryption
Authentication
____ was an early WiFi network security technology that had major cryptographic weaknesses. In 2002, it was replaced by ______, which relied on _____ encryption. In 2004, that was replaced by _______, which used ______ encryption and is still used today.
WEP WPA TKIP-RC4 WPA2 CCMP-AES
EAP stands for _______.
Extensible Authentication Protocol
What is Extensible Authentication Protocol (EAP)?
An authentication framework commonly used for wireless networks.
Name the four types of EAP that WPA and WPA2 use for authentication.
EAP-FAST
EAP-TLS (EAP Transport Layer Security)
EAP-TTLS (EAP Tunneled Transport Layer Security)
PEAP (Protected EAP)
Describe EAP-FAST
EAP Flexible Authentication via Secure Tunneling
- Cisco’s proposal to replace LEAP (Lightweight EAP), previously used with WEP.
- Lightweight and secure.
[Not doing a great job on the EAP flashcards. Pretty confusing. Just copying Messer’s stuff]
Describe EAP-TLS.
EAP Transport Layer Security
- Gained wide adoption as wireless tech became more popular
- Same security we use for web servers. Now using for wireless authentication
- Strong security, wide adoption
- Support form most of the industry
Describe EAP-TTLS.
EAP Tunneled Transport Layer Security
- Some orgs needed additional options for authentication
- Supports other authentication protocols in a TLS tunnel
- Use any authentication you can support, maintains security with TLS