Module 13: End-point Security Flashcards
What are 3 Traditional Host based security measures?
Antivirus Software
Host Based IPS
Host Based Firewall
New BYOD policies needs require what?
A different way of approaching end point security
What are 4 types of network based malware protection
Advanced Malware Protection
Email Security Appliance
Web Security Appliance
Network Admission Control
What to do with local data
Locally encrypt the harddrive
What capabilities does a NAC (network access control) have
Profiling and Visibility
Guest Network Access
Security Posture Checking
Incident Response
What is the function of a NAC
To force the clients to query a authentication server
What is 802.1X?
is a network authentication protocol that opens ports for network access when an organisation authenticates a user’s identity and authorises them.
What is EAP?
Extensible Authentication Protocol
What does EAP do?
allows a conversation between a Supplicant (the wireless/wired client) and the RADIUS (the authentication server), via an Authenticator (a wired switch or wireless access point which acts as a proxy).
What is a Supplicant (Client)?
The device that request access to LAN and switch services.
What is the authenticator (switch)?
the switch acts as a intermediary between the client and the authentication server
What is the authentication server?
performs the actual authentication of the client. It validates the identity of the client.
Step 1 for 802.1x Config?
enable AAA using aaa new-model
Step 2 for 802.1x Config?
Designate the RADIUS server and configure its IP etc
Step 3 for 802.1x Config?
Create an 802.1x port based authentication method list using the aaa authentication dot1x command