Módulo 08 - Network and Endpoint Security Flashcards
Define: OS Hardening
Enhancing an operating system’s security by removing unnecessary components, limiting access, and applying best practices.
Define: Access Control Lists (ACLs)
Rules defining user permissions to resources, such as files or networks, based on identifiers and associated privileges.
Define: Full Disk Encryption (FDE)
Encryption that protects all data on a hard drive, including system files and user data, even when the OS is off.
Acronym:
PoLP
Principle of Least Privilege.
Acronym:
S/MIME
Secure/Multipurpose Internet Mail Extensions.
Compare:
Endpoint Protection vs. Patch Management
Endpoint Protection: Focuses on safeguarding devices against malware and threats.
Patch Management: Addresses vulnerabilities by applying updates and patches.
List:
Key elements of endpoint hardening.
- Remove unnecessary software.
- Change default passwords.
- Apply configuration enforcement.
- Implement encryption techniques.
- Use access control policies.
- Monitor for changes and compliance.
List:
Types of encryption techniques.
- Full Disk Encryption (FDE).
- Removable Media Encryption.
- Virtual Private Networks (VPNs).
- Email Encryption.
Define:
Implicit Deny ACLs
A rule that denies access unless explicitly allowed, ensuring tighter security by default.
Define:
Authorization Creep
Gradual accumulation of unnecessary privileges by a user due to improper privilege management.
Define:
Deprovisioning
The process of removing access rights and permissions when an employee or contractor leaves or a project ends.
Acronym:
FSRM
File Server Resource Manager.
Acronym:
FTPS
FTP Secure
which adds SSL/TLS to FTP for secure logon and data transfer.
Acronym:
SFTP
Secure Shell File Transfer Protocol.
Define:
FSRM Quotas
Storage limits on a directory.
Hard (Block further storage) or Soft (Only alerts)
Define:
File Screens on FSRM
Rules tha restrict file types that might be saved on a directory
Define:
NetBIOS
Network protocol for file and printer sharing, quite unsecure.
Define:
Tombstone File
File replaced that informs about a violation, keeping the original unaccessible
Acronym:
IPSec
Internet Protocol Security
Acronym:
SCP
Secure Copy Protocol
Define:
Administrative Share
Hidden directory that only admins have access
Compare:
SFTP vs. FTPS
SFTP: Secure Shell-based, not related to FTP, uses SSH2 for secure data transfer.
FTPS: FTP with SSL/TLS, requires server certificates for encrypted communication.
Compare:
Hard Limit vs. Soft Limit in Quotas
Hard Limit: Prevents users from exceeding the data quota.
Soft Limit: Allows exceeding the quota but sends a warning message.
List:
DLP Remediation methods
- Alert only: Registra o incidente sem bloquear o acesso.
- Block: Impede a cópia, mas mantém o arquivo acessível.
- Quarantine: Restringe o acesso ao arquivo original.
- Tombstone: Substitui o arquivo por uma mensagem de violação de política.
Acronym:
NTFS
New Technology File System.
Define:
NTFS Permissions
Permissions that control access to files and folders on drives formatted with NTFS, applying both locally and over a network.
Define:
Share Permissions
Permissions that control access to shared folders over a network but do not apply to local access.
Define:
Inheritance
A feature where folders pass down their permissions to subfolders and files, unless explicitly overridden.
Define:
Octal Notation in Permissions
A numeric representation of file permissions where read = 4, write = 2, and execute = 1.
Define:
Chmod Command
A Linux command used to change file permissions in symbolic or absolute (octal) mode.
Acronym:
DACL
Discretionary Access Control List.
True or False:
NTFS permissions apply only to files accessed over the network.
False.
NTFS permissions apply to both local and network access.
True or False:
Share permissions can be assigned to individual files.
False
True or False:
In Linux, a file with permissions 755 means the owner has read, write, and execute permissions.
A: True.
Compare:
Share Permissions vs. NTFS Permissions
Share Permissions: Apply only to network access; control at the folder level; limited to Reader, Contributor, and Co-owner.
NTFS Permissions: Apply to both local and network access; can control at the file level; highly granular.
Compare:
Symbolic vs. Absolute Mode in chmod
Symbolic Mode: Uses letters (e.g., u=rwx) to specify permissions.
Absolute Mode: Uses octal numbers (e.g., 755) to represent permissions.
Example:
Interpret this permission string: drwxr-xr-x.
d: Directory.
Owner: Read, write, execute.
Group: Read, execute.
Others: Read, execute.
Define:
Physical Port Hardening
The process of disabling unused physical interfaces, such as USB or HDMI, to reduce physical attack vectors.
Define:
Logical Ports
Software-based communication endpoints used for data exchange between applications or services.
Define:
Host-Based Firewalls
Firewalls installed on individual devices to control incoming and outgoing network traffic.
Define:
Intrusion Prevention System (IPS)
A system that monitors network traffic to detect and prevent potential intrusions.
Define:
Service Hardening
Configuring services to minimize vulnerabilities by disabling unnecessary features and applying security updates.
Define:
Default-Deny Policy
A security policy that blocks all traffic unless explicitly permitted.
Acronym:
UEFI
Unified Extensible Firmware Interface.
Acronym:
BIOS
Basic Input/Output System.
Acronym:
nmap
Network Mapper
Acronym:
ss (Linux Command)
Socket Statistics.
Compare:
Host-Based Firewalls vs. Network Firewalls
Host-Based Firewalls: Protect individual devices and filter traffic specific to that host.
Network Firewalls: Protect an entire network and filter traffic entering or leaving the network.
Compare:
nmap vs. netstat
nmap: Scans for open TCP/UDP ports on a network.
netstat: Displays active network connections and listening sockets on a system.
Example:
What command scans for open TCP ports using nmap?
nmap -sT ipaddress.
Example:
How to disable a service in Linux?
Use systemctl disable servicename to prevent the service from starting on boot.
Define:
Wireless Access Point (WAP)
A device that broadcasts wireless signals, connects wireless clients to a network, and may link to a wired network.
Define:
Thin Access Point
A WAP that relies on a wireless controller for management and client handling.
Define:
Wireless LAN Controller (WLC)
A device used to manage multiple access points in an enterprise environment.
Define:
Service Set Identifier (SSID)
The name of a wireless network that allows users to identify and connect to it.
Define:
WPA2-PSK
A Wi-Fi security protocol using a pre-shared key for group authentication.
Define:
Simultaneous Authentication of Equals (SAE)
A WPA3 protocol for secure password exchange, resistant to offline brute force attacks.
Define:
Heat Map
A visual representation showing wireless signal strength across an area.
Acronym:
WAP
Wireless Access Point.
Acronym:
WLC
Wireless LAN Controller.
Acronym:
WDS
Wireless Distribution System.
Acronym:
WPS
Wi-Fi Protected Setup.
Acronym:
DPP
Device Provisioning Protocol.
Acronym:
RADIUS
Remote Authentication Dial-In User Service.
Acronym:
EAP
Extensible Authentication Protocol.
True or False:
A thin access point can manage clients independently without a WLC.
False.
Thin access points rely on a WLC for client management.
True or False:
WPA3-Enterprise requires the use of 192-bit AES encryption.
True.
WPA3-Enterprise mandates 192-bit AES encryption.
True or False:
WPA2-PSK uses a group-shared passphrase for authentication.
True.
WPA2-PSK uses a pre-shared key for group authentication.
True or False:
Site surveys are unnecessary for optimizing WAP placement.
False.
Site surveys are essential for ensuring optimal WAP placement and coverage.
Compare:
Fat vs. Thin Access Points
Fat Access Points: Standalone devices that manage clients and broadcast the network independently.
Thin Access Points: Require a wireless LAN controller for client and network management.
Compare:
WPA2 vs. WPA3
WPA2: Uses AES with CCMP for encryption and is vulnerable to handshake attacks.
WPA3: Introduces SAE for secure password exchange and enhanced encryption protocols.
Compare:
PSK vs. SAE Authentication
PSK: Uses a shared passphrase, vulnerable to brute force attacks.
SAE: Uses a secure handshake resistant to offline attacks.
List:
Key features of WPA3.
- Simultaneous Authentication of Equals (SAE).
- Enhanced Open for encryption on open networks.
- Updated cryptographic protocols using AES-GCMP.
- Support for Wi-Fi Easy Connect for simplified configuration.
List:
Wi-Fi authentication methods.
- Personal (PSK or SAE).
- Open (unencrypted or Enhanced Open).
- Enterprise (RADIUS with unique credentials).
Example:
What does WPA3-SAE improve over WPA2-PSK?
WPA3-SAE uses a secure handshake to prevent offline attacks, unlike WPA2-PSK, which is vulnerable to brute force.
Example:
How is a wireless bridge implemented?
By connecting two wireless networks through a wired or wireless distribution system (WDS).
Example:
What is a heat map used for in wireless networks?
To visualize signal strength and channel overlap for optimizing WAP placement.
Define:
KRACK Attack
A replay attack targeting the WPA and WPA2 4-way handshake, allowing offline brute-force attempts to recover keys.
Define:
Evil Twin Attack
An attack where a rogue access point mimics a legitimate network to intercept user data.
Define:
Initialization Vector (IV) Attack
A cryptographic attack exploiting the reuse of initialization vectors in WEP encryption to decrypt keys.
Define:
Bluejacking
Sending unsolicited messages to nearby Bluetooth devices in discovery mode.
Define:
Bluesnarfing
Exploiting vulnerabilities in Bluetooth to access sensitive data on a paired device.
Define:
RFID Eavesdropping
Using an RFID reader to intercept communication between a tag and a legitimate scanner.
Define:
Relay Attack
Capturing NFC data in transit to impersonate the original device.
Acronym:
WEP
Wired Equivalent Privacy.
Acronym:
NFC
Near Field Communication.
Acronym:
RFID
Radio Frequency Identification.
True or False:
WPA3 is vulnerable to KRACK attacks.
False. WPA3 addresses the vulnerabilities exploited in KRACK attacks.
True or False:
A jamming attack can be non-malicious.
True. Non-malicious interference can come from devices like microwave ovens or cordless phones.
True or False:
Disassociation attacks exploit encrypted management frames.
False. Disassociation attacks exploit unencrypted management frames.
True or False:
Passive RFID tags require external power to operate.
True. Passive RFID tags rely on energy from the scanner.
Compare:
Rogue Access Point vs. Evil Twin
Rogue Access Point: Any unauthorized access point on a network.
Evil Twin: A rogue access point designed to mimic a legitimate one.
Compare:
RFID vs. NFC
RFID: One-way communication; longer range.
NFC: Two-way communication; very short range.
List:
Common wireless attacks.
- Wireless denial-of-service (DoS).
- Evil twin attack.
- Initialization vector (IV) attack.
- Jamming attack.
- Disassociation/deauthentication attack.
- Replay and key recovery attacks.
Define:
What is a rogue access point?
An unauthorized device providing wireless access, potentially used for malicious purposes.