Network security operations Flashcards
a barrier that intercepts and inspects traffic moving from one area of the network to another
A network firewall
a firewall that operates at Layers 3 and 4 of the OSI network model: network and transport. In most networks today, that equates to the IP address (Layer 3) and the TCP or UDP port number (Layer 4) of the traffic passing through the firewall
packet filter
These firewalls inspect incoming (ingress) and outgoing (egress) traffic and compare the following attributes to a database of packet filter rules that determine if the firewall will forward (allow) or drop (deny) the traffic:
Protocol (typically IP)
Source IP Address
Destination IP Address
Source TCP or UDP port number
Destination TCP or UDP port number
These firewalls are only concerned with the address label (header) of the packets and perform no level of inspection on the contents of the packet (the payload).
This means that potentially dangerous payloads could pass through a packet filter without being detected as long as the source and destination values were approved by the firewall rules.
a device that operates as a middleman between two or more systems to help conceal the true identity of the client and server
circuit-level gateway
The gateway may change the IP address and the TCP/UDP port number of the traffic to allow two networks to communicate that otherwise could not (for example, your home network and the internet).
Circuit-level gateways are the foundation of
network address translation (NAT) and port address translation (PAT), which are commonly used in firewalls to allow private IP address ranges to communicate on the internet.
feature allows a firewall to identify traffic as conversational and automatically create temporary firewall rules to permit the response traffic to flow back to the sender. In this way, instead of maintaining a multitude of rules, you only need to create a firewall rule that allows the communication to begin.
stateful inspection
To reduce the number of firewall rules needed to support TCP communication
proxy servers that could act as a middleman, reading and parsing the traffic payload, and then forwarding it on to the intended destination if the payload was safe. This behavior was later incorporated into firewalls to provide a deeper level of inspection.
application-aware firewalls, or Layer-7 firewalls because application is the seventh layer of the OSI model.
What is the purpose of a firewall?
To restrict traffic from entering (ingress) or exiting (egress) a network
A system administrator wants to protect the local network from untrustworthy external traffic. Which device should this system administrator implement?
firewall
is a barrier that intercepts and inspects traffic moving from one network to another.
Which three levels of the OSI model does stateful inspection require?
Layers 3, 4, and 5
In order for a firewall to understand whether there is a conversation going on between two endpoints, it must be able to analyze the address (Layer 3), it must be able to analyze the type of traffic—usually TCP or UDP—which requires Layer 4 inspection, and it must be able to analyze Layer 5 data in order to recognize that a session has been requested and established.
advanced security solutions that can identify malicious traffic based on a database of known behaviors and payload signatures.
Intrusion detection systems (IDS) and intrusion prevention systems (IPS)
monitor the network to detect threats,
IDS
are not always physical appliances. They are also available as virtual appliances and as host-based IPS/IDS applications, which can be installed on your servers or workstations.
intercept and block threats.
IPS
are not always physical appliances. They are also available as virtual appliances and as host-based IPS/IDS applications, which can be installed on your servers or workstations.
IDS & IPS both types of systems can be configured to operate in ___, which is where they attach to the network as listening devices only.
tap mode
tap mode works well for IDS devices because they are passive listeners on the network and are designed to alert a network administrator if they detect any suspicious behavior.
For an IPS device to stop traffic, it must be positioned in the middle of the traffic stream,
line mode.
IPS devices have many network ports that are designed to operate as input/output pairs. The network administrator will physically route cables through the IPS device to create choke points in the network
the file is blocked based on how often that type of file is found to carry viruses or malware.
method known as reputation-based protection.
A good example of this is when IPS devices and firewalls block executable (EXE) attachments or downloads.
a set of public web servers connected to a dedicated network switch that is connected to your firewall by one network cable. You acquire an IPS device so that you can scan the traffic entering and leaving that network. To do so, you will disconnect the existing cable that connects the switch to the firewall and then place the IPS device in-line by connecting the firewall to one of the ports in an input/output pair and the switch to the other port in the pair…next…
The IPS device bridges the traffic and appears invisible on the network, yet it is actually inspecting every packet and copying it from one cable to the other.
IDS
Monitors the network to detect threats
Listens passively on the network
Alerts network admin of any detected suspicious behavior
IPS
Intercepts and blocks threats
Has many network ports to operate as input/output pairs
Has cables routed physically through devices to create choke points
Both IDS & IPS
Identifies malicious traffic
Available as virtual and host-based applications
Can be configured to operate in tap mode
IDS Deployment
Suspicious traffic comes into the switch
Intrusion system inspects traffic and alerts admin of suspicious packets
An alarm is sent to admin’s management system
IPS Deployment
Suspicious traffic comes in
An intrusion system blocks suspicious packets before it gets to the switch
Wiretapping is a Layer 1 threat because
it involves tampering with the physical cables of a victim’s network.
Fiber optic cables use light waves instead of electrons and therefore do not emit an EMF signature that can be captured and interpreted.
is susceptible to electronic sniffing or listening devices because the electrons flowing through the cables create a perceptible electromagnetic field (EMF).
Copper-based wiring, such as Category 6 cabling,
physical vulnerabilities and threats as Layer 1 risks
check the security of the locks on the doors to the data center, equipment racks, and wiring closets throughout your building.