Network Security Flashcards

1
Q

(Transport Layer Security) The TLS Protocol

A

The TLS protocol aims primarily to provide privacy and data integrity between two or more communicating computer applications.

When secured by TLS, connections between a client (e.g., a web browser) and a server (e.g., wikipedia.org) should have one or more of the following properties:

  • A secure/ private connection because symmetric cryptography is used to encrypt the data transmitted.
  • The identity of the communicating parties can be authenticated using public key cryptography
  • The connection is reliable because each message transmitted includes a message integrity check using a message authentication code to prevent undetected loss or alteration of the data during transmission.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which ports is reserved for HTTP and HTTPS over TLS?

A

Port 443 for HTTPS

Port 80 for HTTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

TLS inspection

A

Requires an additional root certificate installed on clients.

Two TLS connections are created: Client to Proxy and Proxy to Server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

TLS Handshake Protocol

A

The handshake protocol:

  • Negotiates the encryption to be used
  • Establishes a shared session key
  • Authenticates the server
  • Authenticates the client (optional)
  • After the handshake, application data is transmitted securely (encrypted + integrity protected)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

TLS: Record protocol overview

A

The overview provides two services for TLS connections.

Message Confidentiality:
Encrypt the payload using symmetric encryption (e.g. AES)

Message Integrity/Authenticity:
Calculate a MAC to ensure the message was not modified in transmission
For both operations the session key exchanged during the handshake is used

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

TLS challenges

A

Many vulnerabilities exist for TLS.
It is important to keep the client and server software up-to-date.

  • Configure server to exclude weak algorithms.
  • TLS provides security just for a single TCP connection.
  • Browser can establish HTTP and HTTPS connections; even to the same server (e.g. HTML via HTTPS, images via HTTP)
  • Relies on browser PKI which has many security issues
  • No trust indicator
  • Phishing and TLS can be easily combined
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

VPN

A

TLS secures only a single TCP connection
Sometimes: all communication from a computer shall be secured also non-TCP communication shall be secured

Typical application:
VPN tunnel into a company network
Tunnel can only be established after authentication
All communication is routed (and secured) through the tunnel
Client is virtually part of the local company network
Client gets access to internal services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

TOR The Onion Router

A

An anonymizing routing protocol
Originally sponsored by the US Naval Research Laboratory
From 2004 to 2006 was supported by EFF
Since 2006 independent nonprofit organisation
Creates a multi-hop proxy circuit through the Internet from
client to destination.
next destination.
No cleartext-gap, except at the exit-node.
No node knows end-to-end client-server association

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

VPN authentication

A

Tunnel endpoints must be authenticated before secure VPN tunnels can be established. User-created remote-access VPNs may use passwords, biometrics, two-factor authentication or other cryptographic methods. Network-to-network tunnels often use passwords or digital certificates. They permanently store the key to allow the tunnel to establish automatically, without intervention from the administrator.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Firewall

A

A firewall is a check point that protects the internal networks against attack from outside networks. The check point decides which traffic can pass in & out based on rules.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Stateless packet filter

A

A packet filter is a network router that can accept/reject packets based on headers. Decisions based on attributes such as:

Source or Destination IP Addresses
Source or Destination Port Numbers
Protocol (UDP, TCP or ICMP)
ICMP message type
And which interface the packet arrived on
Unaware of session states at internal or external hosts
High speed, but primitive filter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Stateful Packet filters

A

Stateful packet filters track current state of a connection
Stateful packet filters keep track of sessions
Recognise if a particular packet is part of an established
Will add a temporary rule to allow the reply traffic back through
the firewall.
This makes the definition of filtering rules easier to
accomplish and therefore potentially more secure.
High speed, can use relatively advanced filter rules
Requires memory
So can be subject to DOS (Denial of Service) attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Honeypot🍯

A

A honeypot: is a computer configured to detect network attacks or malicious behavior, appears to be part of a network, and seems to contain information or a resource of value to attackers. But honeypots are isolated, are never advertised and are continuously monitored. All connections to honeypots are per definition malicious.
Can be used to extract attack signatures
Honeynet is an international security club, see next slide.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Application Level Gateway

A

Inspects payload in end-to-end or proxy application connection
Support specific application protocols
e.g. http, telnet, ftp, smtp etc.
each protocol supported by a specific proxy HW/SW module
Can be configured to filter specific user applications
E.g. Facebook, Youtube, LinkedIn
Can filter detailed elements in each specific user application
Can provide intrusion detection and intrusion prevention
Very high processing load in firewall
High volume needs high performance hardware, or else will be slow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Intrusion detection systems

A

Actions aimed at compromising the security of a target network (confidentiality, integrity, availability of resources).

Intrusion detection:
The identification of possible intrusion through intrusion signatures and network activity analysis
IDS: Intrusion Detection Systems

Intrusion prevention:
The process of both detecting intrusion activities and managing automatic responsive actions throughout the network.
IPS: Intrusion Prevention Systems
IDPS: Intrusion Detection and Prevention Systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is detected through an Intrusion Detection System?

A

What can be detected:
Attempted and successful misuse, both external and internal agents.
Malware: Trojan programs, viruses and worms and DoS (Denial of Service) attacks.

Misuse detection:
Use attack “signatures” (need amodel of the attack)
Sequences of system calls, patterns of network traffic, etc.
Must know in advance what attacker can do, based on known attack patterns
Can only detect known attacks
Relatively few false positives

17
Q

Anomaly detection

A

Using a model of normal system behavior, try to detect deviations and abnormalities, e.g., raise an alarm when a statistically rare event(s) occurs.
Can potentially detect unknown attacks. Many false positives.

18
Q

Intrusion Detection Errors

A

False negatives: attack is not detected.
- Big problem in signature-based misuse detection

False positives: harmless behavior is classified as attack

  • Big problem in statistical anomaly detection
  • Both types of IDS suffer from both error types
  • Both false positives and false negatives are problematic.

Most alarms are false positives.

  • Requires automated screening and filtering of alarms. Most true positives are trivial incidents that can be ignored. The attacks will never be able to penetrate any system.
  • Serious incidents need human attention
  • Can be dealt with locally
  • May require external expertise
  • Potential for improvement through more intelligent IDS

Less false positives:
- Better detection of advanced attacks (APT)

19
Q

X.509

A

Is a type of certificate for HTTPS, to authenticate the server (and sometimes the client).

As consequence authorities are necessary to verify the relation between the certificate and its owner.