Section 11 - Network Security Flashcards

1
Q

What does “OSI” stand for?

A

Open Systems Interconnection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

This is used to explain how network communications occur between a host and a remote device over a local area network or a LAN.

A

OSI Model

*** This is very useful to help us categorize different communication protocols that are used in networks, and gives us a common lexicon that we can use to describe the function of different devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a helpful mnemonic that can be used to represent the seven layers of the OSI model?

A

Please - Physical
Do - Data Link
Not - Network
Throw - Transport
Sausage - Session
Pizza - Presentation
Away - Application

*** going from bottom to the top.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the first layer of the OSI model?

A

Physical Layer

This is the layer that represents the actual network cables and radio waves that are used to carry data over a network. Data carried over the network at the physical layer is known as bits.

Ex - fiber optic, copper, or coaxial cable, Wi-Fi, Bluetooth, hubs, repeaters, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the second layer of the OSI model?

A

Data Link Layer

This layer describes how a connection is established, maintained, and transferred over that physical layer. Addressing here is done using physical addresses, like the MAC address. Bits are grouped into frames and then sent over the network.

Ex - MAC addresses, switches, bridges.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How is a switch different than a hub?

A

Switches use MAC addresses as their form of physical addressing. This allows a switch to decide where to send that frame of information based on the MAC address it’s designed to go to. And so, it’s smarter than a hub because it will decide where that particular frame goes as opposed to just repeating it out every single port that it has.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the third layer of the OSI model?

A

Network Layer

This is where logical addressing is actually performed. routing and switching information between hosts, the network and the internetworks. This is the layer where the frames are taken and grouped into packets.

Ex - IP addresses and routers (as these are used to connect to all of our networks together)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the fourth layer of the OSI model?

A

Transport Layer

Manages and ensures transmission of the packets occur from the host to the destination it wants. This uses either TCP or UDP. At this point, our packets are now grouped into segments (TCP) or datagrams (UDP).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the difference between TCP and UDP?

A

TCP has that three-way handshake, and it says, hey I’m ready to send you something, okay I’m ready to be sent something. All right, let’s start sending it. And then they send the information. With UDP, on the other hand, it’s just fire and forget, we send a bunch of information and we just hope it gets there.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the fifth layer of the OSI model?

A

Session Layer

This layer manages the establishment, termination, and synchronization of a session over the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the sixth layer of the OSI model?

A

Presentation Layer

This layer is focused on translating the information into a format that both the sender and the receiver are going to understand.

*** after all, data is nothing but ones and zeroes which is not a language that most people can decipher. The presentation layer helps translates that information into a format that can be understood.

Ex - JPGs, PNG files, encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the seventh layer of the OSI model?

A

Application Layer

This is the layer where the message is originally created and sent from. This is where the user is really starting to interact with the network by using the OSI model.

EX - HTTP for web pages, SMTP for emails, and FTP for file transfer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

This was used to separate physical LANs or WANs into two logical networks, or connect two logical networks together.

A

Bridge

*** These came after hubs because they were dumb and causing a lot of collisions and slowed down the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Essentially, every single port on a ___ acts as if it was a bridged hub on each one.

A

switch

*** This means that it improves the data transfer and security through the intelligent use of MAC addresses, being able to figure out where a device is and only sending information out that particular port of the switch and ignoring the rest.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Switches are subject to three main types of attack. What are they?

A

MAC Flooding
MAC spoofing
Physical Tampering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

This is an attempt to overwhelm the limited switch memory that’s set aside to store the MAC addresses for each port, and this is known as the content addressable memory (CAM).

A

MAC Flooding

*** If a switch is flooded, it can fail-open and begin to start acting like a hub and broadcasting data out every single port.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

This occurs when an attack masks their own MAC address to pretend that they are having the MAC address of some other machine on the network.

A

MAC spoofing

*** By switching your MAC address to a known or allowed device, you can gain access to a network bypassing the access control list (ACL).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

This occurs when an attacker attempts to gain physical access to the switch.

A

Physical Tampering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Switches operate at layer two of the OSI model by making their decisions based on MAC addresses, ___ operate at layer three, making their decisions based on IP addresses.

A

routers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Routers are used to connect…?

A

two or more networks to form an internetwork

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

___ ___ ___ can be configured on the router’s interface to control the flow of traffic into or out of a certain part of the network.

A

Access Control List (ACL)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

These are a set of rules that will either permit or deny traffic based upon certain characteristics, like its source or destination IP address, the source or destination port number associated with it and the application or service being run.

A

ACLs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Most networks are segmented into at least three different zones:

A

LAN
WAN
DMZ

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

This segment can be secured using private IPs, using anti-malware programs, and by placing your clients behind a router and its associated ACLs.

A

LANs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

This segment should be monitored and firewalled to secure your networks against the threats that those contain. The internet is the world’s largest version of this.

A

WAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

The TLS tunnels that are used in HTTPS connection are a type of ___.

A

VPN

*** So anytime you go to a website and you see that secure lock, there’s actually a VPN being used between your web browser and the web server you’re visiting.

27
Q

The most common security zone that is used is what is known as…?

A

DMZ

De-Militarized Zone

28
Q

This zone is focused on providing controlled access to publicly available servers that are hosted within your organizational network.

A

DMZ

*** For example, if you’re self hosting your web server and email servers inside your organization, it’s a best practice to place them within your DMZ because it is a tightly controlled zone with proper access control rules which allows you to maintain precise control of the traffic that’s going to be allowed between the inside, your LAN, the outside, the WAN, and the DMZ portions of the network.

29
Q

What is the purpose of a security zone?

A

Like a DMZ, this creates a separation of critical assets. Not all devices in your network require the same level of protection.

30
Q

This is a specialized type of DMZ that’s created for your partner organizations to access over a wide area network.

A

Extranet

*** This acts much like a DMZ, but it’s not publicly accessible.

31
Q

This is something that allows you to expand your internet network within your organization across multiple areas.

A

Intranet

32
Q

What does it mean to be “internet-facing”?

A

Like an internet-facing host or server, this means that it accepts inbound connections from the internet.

*** For example, if you have a web server in your DMZ, that is an internet-facing host.

33
Q

What is a DMZ?

A

Demilitarized Zone

A segment isolated from the rest of a private network by one or more firewalls that accepts connections from the internet over designated ports.

*** Anything behind the DMZ is invisible to the outside network. So if you did a scan of the network from the outside you would not see all of the PC’s inside of the inside zone.

34
Q

What should you put in your DMZ?

A

Anything that somebody from the internet needs access to, should be placed in your DMZ.

This includes email, web server, communication servers, proxy servers or remote access servers. Anything that provides public services or even extranet capabilities.

35
Q

Any kind of hosts that you put in the DMZ should be what we consider a ___ ___. This is a host or server that is not configured with any services that run on the local network.

A

bastion host

36
Q

How do you configure your devices once in the DMZ?

A

A jumpbox

This is a hardened server that provides access to other hosts within the DMZ.

37
Q

A lot of people use ___ ___ as a jumpbox because you can have it hardened and secured, you can use it for the time you need, and then destroy it and rebuild a new one.

A

virtual machine

38
Q

What is “NAC”?

A

Network Access Control

A device is scanned to determined its current state of security prior to it being allowed access to your network.

39
Q

NACs can be used on computer within your internet network physically located in your building or they can be connected to devices ____ through a ___

A

remotely
VPN

40
Q

NACs can be run either using ___ or ___ Agents.

A

Persistent
Non-Persistent

41
Q

This is a piece of software that’s installed on a device that’s requesting access to the network.

A

Persistent Agents

42
Q

This uses a piece of software that scans the device remotely or is installed and subsequently removed after the scan.

A

Non-Persistent Agents

43
Q

NACs can be offered as a ____ or a ___ solution.

A

hardware
software

44
Q

One of the most commonly used NAC mechanisms is called the…?

A

IEEE Standard 802.1x

*** This is a port-based NAC

45
Q

This adds a layer of separation to our networks without requiring us to buy additional switches that have to be configured and installed on the network.

A

VLAN

Virtual Local Area Networks

These are implemented to segment our network, reduce collision, organize our networks, boost performance and increase security.

*** Switches can provide the ability to create these

46
Q

What have attackers created in regards to VLAN?

A

VLAN Hopping

This allows them to break out of our VLANs and access other VLAN data

47
Q

There are a couple of methods to allow attackers to VLAN hop. What are they?

A

Switch Spoofing
Double Tagging

48
Q

In this attack, an attacker essentially configures their device to pretend that it’s a switch and they connect to a switch port to negotiate a trunk link and break out of the VLAN.

A

Switch Spoofing

49
Q

As traffic goes across a switch, it reads the outermost VLAN tag first, strips it off, and then routes the traffic to the proper VLAN. In this attack, though, an attacker actually adds two VLAN tags, an outer tag and an inner tag, so as traffic goes through the first switch, it removes the outer tag and is then forwarded to the destination of the inner tag.

A

Double Tagging

50
Q

This is the act of creating subnetworks logically through the manipulation of IP addresses.

A

Subnetting

** So, if i take a large chunk of IPs, like a 256 block, I can break it down into four blocks of 64 IPs, or eight blocks of 32 IPs, however you want o break it down in your subnetting.

51
Q

What are the benefits of subnetting?

A
  1. It allows us to more efficiently use the IP address space that we’ve been given.
  2. It’s going to reduce the broadcast traffic and the number of collisions, because there’s less hosts on a given network.
  3. It can increase security by making our networks more compartmentalized and allows them to be in smaller sections.
52
Q

This is the process of changing an IP address while it transits across a router.

A

NAT

Network Address Translation

** This was used because we want to conserve public IP addresses because they were limited in IPv4. From a security point of view, we can also hide our internal networks from attackers.

53
Q

The most commonly used type of NAT is what we call…?

A

PAT

Port Address Translation

54
Q

This is where we have a single public IP address assigned to a router and all of the private IP addresses that are assigned inside to our host.

A

PAT

*** This is most likely what you are using inside your small office or home office network.

55
Q

How do NATs assist in hiding your internal network from attackers?

A

Now, when a host wants to communicate out over the WAN, it’s going to send the request to the router and the router is then going to forward the request out to the Internet, to the server that it’s trying to get to on behalf of the host. And when it does this, it keeps track of the translation it does by using a unique random high port number for each request. This means if the attacker is getting your network from the outside, they are only going to see that single public IP address of the router and they are not going to see the fact that you have one, five, ten, or 100 hosts inside of your network, and they are not going to be able to exactly know how many devices there are or what kind they are.

56
Q

What are private IP ranges?

A

Class A - anything that starts with 10. 10.0.0.0-10.255.255.255

Class B - Addresses that start with 172.16.0.0-172.31.0.0

Class C - 192.168.0.0-192.168.255.255 (this is most likely what you’ll use at home)

57
Q

If it starts with a 192.168. then it is a…?

A

Private IP address

** These cannot be transmitted over the internet. Instead, once it hits your external router, it’s going to use either a PAT or NAT to give it a public IP address and a port number to send the information out to the internet and then receive it back.

58
Q

This is a term used for a device that provides voice communication to your end users.

A

Telephony devices

*** This was used in networks to make connections with the outside world such as through your modem. A modem was an old device that we used to use to allow us to modulate and demodulate digital information into an analog signal, like AOL (dial up).

59
Q

This is when an attacker starts dialing random phone numbers to see if any modems would answer on the other side.

A

War Dialing

*** The best to prevent this is by using a callback feature.

60
Q

What does the “callback feature” do?

A

Your modem would be set so that when somebody calls in, they would then hangup and the modem, if it recognizes that phone number based on caller ID will then call them back and initiate the connection.

61
Q

This is the telephone system that runs all of the internal phone lines for your company.

A

PBX System

Public Branch Exchange

** If you’re sitting in your office and you want to call your accountant inside the office and you dial the last four digits of his phone number only to get him, that internal call is being routed through your PBX system.

You’re going to find this much more often in your networks than you are going to find modems. However, they are commonly being replaced with VoIP.

62
Q

This works by relying on IP phones, software and __ gateways.

A

VoIP

Voice Over Internet Protocol

63
Q

This is simply a device that looks like a regular telephone but takes a network cable into it as opposed to a phone cable.

A

IP phone

*** This will connect back to the VoIP gateway, which will make the conversation happen between your phone and the remote destination that you’re trying to call.