Network Security Flashcards
Penetration Testing
Tests network security by attempting to exploit vulnerabilities.
IP Tunnel
Secure VPN connection between two endpoints
SPI
Stateful Packet Inspection
Checks incoming packets against outgoing requests
Password Guidelines
No dictionary words Not username - forwards or backwards Limit login attempts >= 8 characters Alphanumeric Change often
TLS
Transport Layer Security
Requires client and server to use certificates to verify identity
Replacement to SSL
Application Layer
TTLS
Tunneled Transport Layer Security
Only authentication server is issued a certificate
Client authentication requires a password
Application Layer
IPsec
IP Security
Each packet encrypted prior to transmission
Network Layer
Signature
AKA Definition
What antivirus software uses to identify viruses
NAQC
Network Access Quarantine Control
Resource Kit tool in Windows Server 2003 / 2008
Admins prevent clients from connecting to network with machines that aren’t secure
ACL
Access Control List
List of permit and deny statements to control traffic in/out of network interface
Technologies firewalls are based on
Packet filtering
Proxy server
Stateful packet filtering
DMZ
Demilitarized zone
Isolated area for servers that communicate with the outside world
Packet Filtering
Limits packets that can enter the network and what segment they can move to.
DA: fragmented packets can still enter, difficult to implement complex ACLs, not all network services can be filtered
Proxy Server
Client uses proxy server to access the server. Uses authentication and policies.
DA: run very slowly, adding services is difficult, proxy server failure = network failure
Stateful Firewall
Inbound and outbound data packets are compared to determine if connection should be allowed.
IDS
Intrusion Detection System
Monitor inbound and outbound traffic and reports suspicious activity
IPS
Intrusion Prevention System
Stops / prevents malicious attacks that it detects in real time
HIDS
Host-based Intrusion Detection System
Monitors computer for changes to system file, registry, files, and system logs
Web Filter
AKA Content Filter
Uses database of inappropriate websites. Monitors traffic on HTTP and HTTPS
Packet Shaper
Prioritizes traffic based on type
NGFW
Next-generation Firewall
AKA layer 7 firewall
Combines traditional firewall with other network appliances
CIA
Confidentiality
Integrity
Availability
Example: Kerberos
AAA
Authentication
Authorization
Accounting
Example: RADIUS or TACAS+
RADIUS
Remote Authentication Dial-In Service
TACAS+
Terminal Access Controller Access-Control System Plus
NAC
Network Access Control
UTM
Unified Threat Management
Wide range of security features in one appliance.
Could include: firewall, IDS/IPS, VPN, gateway antivirus/anti-spam, load balancing, content filtering