Section 12 - Perimeter Security Flashcards

1
Q

When we discuss perimeter security, we’re focused on the…?

A

outer layer of our defense-in-depth posture for our networks.

This is the boundary where we segment our LAN from the WAN and fro the Internet at large.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

These are primarily used to section off and protect one network from another.

A

Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the three main types of firewalls?

A

Software-based
Hardware-based
Embedded firewalls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

These firewalls run as a piece of software on a host or a server.

A

Software-based

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

These firewalls are a standalone device that’s actually an appliance that’s installed on your network.

A

Hardware-based

*** It looks like another switch or another router that goes into your network stack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

These firewalls work as a single function out of many on a single device. It’s one piece of the larger device that does many different functions.

A

Embedded firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

This is going to inspect each packet as it passes through the firewall, and it’ll accept it or reject it based on the rules that it’s been given.

A

Packet Filtering

** This relies on the firewall’s configuration and the access control list that’s been installed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the two types of packet filtering?

A

Stateless
Stateful

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

This type of packet filtering is going to accept or reject packets based on the IP address and the port number that was requested.

A

stateless packet filtering

*** So if you’re running a web server and you requested to come in on port 80, it would allow that. However, if you requested to come in on port 53 it would be denied because that port is not on the ACL.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

This type of packet filtering is going to keep track of requests that leave through the firewall.

A

Stateful packet filtering

*** So, if I make a request from a host through the firewall, it will temporarily open up a port number that I made the request from, some random high port number like 50,000 or 56,000.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

By using __ __ __, you can almost entirely eliminate IP spoofing as a threat because the firewall is going to inspect the header of each packet being received. It’s then going to compare that against what it was expecting based on the request that recently went out, and then, it’s going to make its accept or reject decisions based on this additional information.

A

stateful packet inspection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

This is going to filter traffic according to the port, whether it’s a TCP or UDP port.

A

NAT filtering

*** This can be done by matching the incoming traffic to the requesting IP, and by matching the incoming traffic to the requesting IP address and port.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

This is going to apply security mechanisms to specific applications such as FDP or Telnet.

Instead of blocking traffic based on the Telnet port instead it’s going to inspect each packet an determine which application it was meant for, and if it finds out that it was meant for Telnet, it would block it because that was unauthorized.

A

ALG

Application-Layer Gateway

AKA - Layer 7 Firewalls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

This works at the session layer of the OSI model and applies security mechanisms when a TCP or UDP connection is first established. Once that connection is established, the packets can then be sent or received without any further inspection or checks because all of that was done during the session establishment.

A

Circuit-level Gateway

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

This is going to filter out computers and prevent them from accessing beyond the firewall based on their MAC addresses.

A

MAC Filtering

*** This is used as part of your local area network before it gets out into the routing and layer 3 logical addresses that go out beyond the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

In an ___ ___ ___, you can either explicitly allow, explicitly deny, or implicitly deny traffic that’s sent or received through the firewall.

A

access control list

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

When I talk about explicit allow, this means…?

A

That traffic should be allowed to enter or leave the network because the rule allows for it to happen

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

When I talk about explicit deny, this means…?

A

That traffic should not be allowed to enter or leave the network because this rule says so.

19
Q

Most newer firewalls are set to ___ ___ by default now.

A

implicitly deny

*** This means that the ACL assumes if it’s not on the explicit allow it will deny access.

20
Q

This is installed on a server in your environment and it provides traffic control in the data that’s being sent to and from your web applications.

A

WAF

Web Application Firewall

*** These are useful in helping to mitigate threats like cross-site scripting and SQL injection attacks because these web application firewalls are designed to specifically look for these type of threats and block them.

21
Q

This is a device that acts as a middle man for your clients.

A

Proxy servers

*** For example, if you’re at work and you wanted to connect to diontraining.com, your work computer’s likely going to go from itself to a proxy server within your company’s LAN. And then, that proxy server makes the connection to Dion Training to get the information that you requested. And then it will hand it back to you. This middle man approach allows the company to log everything that’s being requested, who made them, and to filter out things they don’t want you to access.

22
Q

What are the four different types of proxies in use today?

A
  1. IP Proxy
  2. Caching Proxy
  3. Content Filter
  4. Web Security Gateways
23
Q

This proxy is used to secure a network by keeping machines behind it anonymous.

A

IP Proxy

*** This makes it to where the server doesn’t know know what particular computer is actually connected to it from your network. All the server can see is the proxy itself. This is because your proxy is using NAT to translate your request from your machine into a request from the proxy.

24
Q

This proxy is used to attempt to serve clients requests without actually connecting to the remote server each time.

A

Caching Proxy

*** Let’s say that you went to my website at diontraining.com, and then your coworker, five minutes later, tried to go to diontraining.com, just like you did. Well, the proxy, if it’s using a cache, is going to be able to keep a copy of my webpage from the first time it fulfilled your request. Then, when your coworker requested it, it would simply give it from its cache instead of going and getting a new copy from my site. This will allow your company to save on bandwidth costs, and increase the speed of delivery for your coworker, because it already has it locally, inside your network.

25
Q

What is the most common type of caching proxy?

A

HTTP Proxy

This attempts to cache the web pages that are visited by users

26
Q

Most caching proxies only keep a copy of the information they get for about…?

A

24 hours

27
Q

The installation and configuration of a caching proxy in your web browser is possible through…?

A

A file called PAC - Proxy Auto Configuration file.

This contains the settings needed for a host to connect to the proxy server.

28
Q

These are used in large organizations as a way to prevent users from getting to stuff that they don’t want you to access at work.

A

Internet Content Filter

29
Q

This type of proxy acts as a go-between for devices that will scan them for viruses, filter out contents like ads, and then can act as a data loss prevention device as well.

It’s looking at what’s being sent out of the network, and what is coming back into the network to ensure that it aligns with your organization’s policies.

A

Web Security Gateway

30
Q

These are used to attract and trap potential attackers to counteract any attempts to unauthorized access to your organization’s network.

A

Honeypots and honeynets

31
Q

This is generally a single computer, but it could also be a file, a group of files, or an area of unused IP address space that might be considered attractive to a would-be attacker.

A

Honeypot

32
Q

This is one or more computers, servers, or an area of the network used to attract an attacker.

A

Honeynet

** This is often deemed necessary when a single honeypot is not sufficient for your purposes.

33
Q

Honeypots and honeynets are often used for the purpose of…?

A

research

*** to try to learn about attackers

34
Q

This designed to protect data by conducting content inspection of your data as it’s being sent out of your organization’s network.

A

DLP

Data Loss Prevention

*** This is also often referred to as ILP (Information Leak Protection) or EPS (Extrusion Prevention Systems)

DLPs are used to ensure your data stays within your network, that it isn’t leaked to outsiders, and that the privacy of your confidential data remains private.

35
Q

DLP systems are installed as a __ DLP or a __ DLP.

A

network-based DLP

cloud-based DLP

*** For example, for DION’s cloud-based DLP anytime an employee tries to send out information outside of their own domain through email, that email is flagged and they have to verify that they understand the data is being sent outside of Dion Training. DLPs can also be configured to automatically detect when particular emails should be flagged based off of keywords or a no-no list. It all depends on how you customize your DLP.

36
Q

This is a type of IDS that attempts to detect malicious network activities, for example, port scans and denial of service attacks.

A

Network Intrusion Detection System

NIDS

*** This is a device placed either before the firewall so that it can be directly exposed to all of the traffic that’s coming in or right behind the firewall.

37
Q

Generally, your NIDS will be placed into what’s known as ___ mode.

This allows it to see all of the traffic that cross the network instead of just the traffic that’s destined for its own Mac address.

A

promiscuous mode

38
Q

A NIDS can only detect, monitor and alert on traffic based or signature based rules or heuristics which means it won’t..?

A

actually stop an attack from occurring

*** all your NIDS is doing is logging it and letting you know about it

39
Q

This is a type of IPS that is designed to inspect traffic and based on its configuration or security policy, it can also remove, detain or redirect that malicious traffic.

A

Network Intrusion Prevention System

NIPS

*** This means that it can detect AND stop the ongoing attack by blocking the IP address that’s causing issues or shutting down the connection.

40
Q

What does it mean when a device on NIPS is a “fail open”?

A

This means that the NIPS is going to simply let all of the traffic through it whenever it fails.

41
Q

What does it mean when a device on NIPS is a “fail close”?

A

The device is going to block all traffic if it fails for some reason. This means it will create a denial of service condition for your entire network.

** For this reason, most networks opt for a fail open NIPS and rely on other defensive layers to provide protection.

42
Q

An addiitional benefit to a NIPS or NIDS system is that it has a built in…?

A

protocol analyzer

**These are used to capture packets which allows an admin to conduct analysis on packet and better troubleshoot and secure their network by seeing patterns in the packet captures.

43
Q

This is a combination of network security devices and technologies that are added to a network to better protect it.

Simply, a single device that combines many other devices and technologies into it.

For example, your UTM might includ a firewall, NIDS/NIPS, content filter/proxy, antivirus or anti-malware and a data loss prevention system.

A

UTM

Unified Threat Management

*** This makes it easier on the user to manage as they’re all accessed through one graphical user interface.

Also known as a NGFW (Next Gen Firewall)