Network Hardening Flashcards
Specifies minimum password length, complexity, periodic changes, and limits on password reuse
Password Policy
Sufficiently long and complex which creates lots of possible combinations for brute force attacks to be completed in time
Strong Password
Securing a system by reducing its surface of vulnerabilities
Hardening
A list of permissions associated with a given a system or network resources
Access Control List (ACL)
What are IoT considerations
- Understand your endpoints
- Track and manage your devices
- Patch vulnerabilities
- Conduct test and evaluation
- Change defaults credentials
- Use encryption protocols
- Segment IoT devices
Defines a list of devices and only allows those on your Wi-Fi network
MAC filtering
Secures wireless networks, including those protected with WEP, WPA, WPA2 and WPA3
Pre-Shared Key (PSK)
Acts as a framework and transport for other authentication protocols
Extensible Authentication Protocol (EAP)
Validates the Address Resolution Protocol (or ARP) packets in your network
Dynamic ARP Inspection (DAI)
Provides security by inspecting DHCP traffic, filtering untrusted DHCP messages, and building a maintaining a DHCP snooping binding table
DHCP Snooping
Mitigates attack vectors based forged ICMPv6 router advertisement messages
operate at Layer 2 of the OSI model for IPv6 networks
IPv6 Router Advertisement Guard (RA-Guard)
Configures a QoS filter that manages the traffic flow of control plane packets to protect the control plane of Cisco IOS routers and switches
Control Plane Policing (CPP)