SECFND 11: Network Security Technologies Flashcards
3 Phases of Attack Continuum
Before, During, After
3 attributes of “Before” attack continuum
Control, Enforce, Harden
3 attributes of “During” attack continuum
Detect, Block, Defend
3 attributes of “After” attack continuum
Scope, Contain, Remediate
“Before” characteristics
Identify what’s on the extended network to implement policies and controls to defend it
“During” characteristics
Detect and block malware continuously
“After” characteristics
Reduce the impact of an attack by identifying point of entry, determining the scope, containing the threat, eliminating the risk of reinfection, and remediating
AAA protocols
RADIUS & TACACS+
RADIUS port
UDP 1812 for auth, 1813, Accounting (or 1645 & 1646)
RADIUS encrypts…
Only the password in an access request packet
TACACS+ port
TCP 49
TACACS encrypts…
body of the packet (not the header)
IAM
Control users and devices connecting to the network. (NAC Like).
Contextual network attributes
NAD
network access device
IAM benefit
Different levels of access and service based on the device.
Firewall “routed mode”
Interfaces on multiple networks. Makes routing decision
Firewall “transparent mode”
L2 “bump in the wire”. All interfaces on same network
Network taps monitor which pins
Tx. Requires two NICS. One for inbound, one for outbound