Network Security Defences Flashcards

1
Q

Do ALL hosts connected to Internet have a unique global IP Address?

A

Depends;

  • Private IP network is an IP network that is not directly connected to the Internet
  • IP addresses in a private network can be assigned arbitrarily
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is NAT? What does it do?

A
  • NAT is a router function designed for IP address conversion
  • It enables Private Networks that use unregistered IP addresses to connect to Internet.
  • It allows connecting two networks together and translates the private (not globally unique) addresses in the internal network into globally unique addresses, before packets are forwarded to another network.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the security advantage of NAT?

A

Hides computers IP addresses port numbers and their connections in internal
networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the benefits of a Network Firewall?

A
  • It restricts people to entering at one carefully controlled point
  • It prevents attackers from getting close to other defences
  • It restricts people to leaving at one carefully controlled point
  • It monitors incoming and outgoing network traffic and permits, or blocks
    network packets based on a set of security rules.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Firewall Configuration what is White listing?

A

Default DENY, Everything that is not explicitly permitted is denied.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What can a Firewall can do with a Packet?

A
  • The firewall forwards the packet. Allow/Permit
  • The firewall deletes the packet and does not forward it. Delete
  • Other options include to log that a certain type of packet appeared,
    to inform the admin, etc.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Firewall Configuration what is Blacklisting?

A

Default PERMIT, Everything that is not explicitly forbidden is permitted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How can a firewall gain information for its decision?

A

it can only use the packet and the data in its header fields

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are 3 Types of Firewalls?

A
  • Stateless Firewalls (uses Stateless Packet Filtering)
  • Stateful Firewalls (uses Stateful Packet Filtering)
  • Application-layer firewalls
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a stateless Firewall?

A
  • Allow or block IP packets based on their IP header fields and TCP/UDP port numbers.
  • Packet filter is defined as a rule table
  • Each rule consist of conditions and an action
  • For each packet, the first matching rule is applied
  • The firewall keeps no state
  • The filtering decision is made separately for every packet, and does not take
    into account any earlier decisions made on related packets.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the packer filtering rule options?

A
  • Inbound:
  • Outbound:
  • Either
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the difference between TCP and UDP?

A

TCP = Transmission Control Protocol - session and connection between two parties

  • *UDP** =User DatagramProtocol - No need to open / close connections
  • Just transmit / broadcast /receive some data
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Why are the risks withstateless firewalls?

A
  • Since the firewall does not keep state, it doesn’t “remember” whether a telnet
    flow is already established, and what source port number the client selected.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Admin makes a rule allowing a client computer on an internal network to talk to a
DNS server outside the firewall.

He would tell the firewall to allow UDP packets from that host, with source ports
1024 to 65535 destined to destination host 1.2.3.4 on destination port 53.

This rule works fine, but what happens when the DNS server responds?

A

To allow the response, you need a rule to allow UDP packets from source port 53 to
destination ports 1024 to 65535.

The problem with allowing those UDP packets is that attackers could talk to any UDP service on a port between 1024 and 65535, as long as they use a source port of 53!

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the Pros and Cons of a stateless firewall?

A

Pros;

  • Simpler to implement, less complexity
  • Highest performance

Challanges;

  • limitations in protecting Private Networks
  • Limitation in supporting UDP

Stateless filtering can still be found, e.g., in routers, but these devices should not be perceived as “real” firewalls, should only be used in internal network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the purpose of a stateful firewall?

A
  • packets that arrive may generate a state in the firewall
  • An important feature of stateful firewalling is connection tracking
  • The firewall sees the first packet of a connection.
  • Subsequent packets are considered to be part of this connection
17
Q

What states in a stateful firewall can connections be?

A
  • New
  • Established
  • Related
  • Invalid
18
Q

What are the Key Limitation of Packet-level Firewalls?

A

Do not prevent application-specific attacks
• No content (payload) inspection
• For example, firewall will not block an attack string that is a buffer overflow in a
URL decoding routine.

Or

an e-mail attachment that contains a virus could pass
through the firewall if SMTP/POP connections are allowed

19
Q

What are application-level firewalls?

A
  • Evaluates network packets for valid data at the application layer before allowing a connection
  • The firewall examines the data in all network packets at the application layer and maintains complete connection state and sequencing information

Limitations;

Obvious: Big overhead and slow!!

Need separate proxy for each application (FTP, HTTP, ..)

Proxy services are vulnerable to operating system and application level bugs

20
Q

What is De-militarized zone (DMZ)?

A

A subnetwork added between an external and an internal network in order to provide an additional layer of security; also called perimeter network. (separates the internal network from the outside world.

  • Outsiders can obtain the information that they need about a company without accessing the internal network.
  • The company’s confidential and proprietary company information should be
    stored behind your DMZ on your internal network.
21
Q

What is a Bastion Host?

A
  • A computer that must be highly secured because it is more vulnerable to attacks than other hosts on a subnetwork
  • A bastion host in a firewall is usually the main point of contact for user processes of hosts of internal networks with processes of external hosts
  • Web Server, Mail Server, etc. placed in DMZ are Bastion Host.
22
Q

What is Simple Packet Filter Architecture?

A

a packet filtering router

23
Q

What is a Dual-Homed Host Architecture?

A

The dual-homed host provides:

  • Proxy services to internal and / or external clients
  • Potentially additional packet filtering capabilities
  • Properties of the dual-homed host: It has at least two network interfaces
  • Drawback: As all permitted traffic passes through the bastion host, this may introduce a performance bottleneck
24
Q

What is a Screened Host Architecture

A

The packet filter:

  • Allows permitted IP traffic between screened host and the Internet
  • Blocks direct traffic between other internal hosts and the Internet
  • The screened host provides proxy services:
  • The screened host acts as a bastion host, being partially protected by the packet filter
25
Q

What is a Screened Subnet Architecture

A
  • A DMZ is created between two packet filters
  • The inner packet filter serves for additional protection in case the bastion host is compromised:
  • This avoids a compromised bastion host to sniff internal traffic
  • The DMZ (i.e., perimeter network) is also a good place to host a publicly accessible information server, e.g. a www-server (use for websites, etc)
26
Q

What can firewalls do?

A
  • A firewall is a focus for security decisions
  • A firewall can enforce a security policy, i.e. concerning access control
  • A firewall can log Internet activity efficiently
  • A firewall can block unwanted traffic if the traffic can be characterized,
  • A firewall can limit exposure to security problems in one part of a network
27
Q

What can firewalls not do?

A
  • A firewall can’t protect against malicious insiders
  • A firewall can’t protect against connections that don’t go through it
  • A firewall can’t protect against completely new threats (Zero Day?)
  • A firewall can’t fully protect against viruses