Section 15: Security Technologies Flashcards
Firewall
Uses a set of rules defining the traffic types permitted or denied through device
Stateful Firewall
Inspects traffic as part of a session and recognizes where the traffic originated
NGFW
NextGen Firewall (OSI Levels 5, 6, 7, using DPI Deep Packet Inspection)
▪ Third-generation firewall that conducts deep packet inspection and packet filtering
ACL
Access Control List
▪ Set of rules applied to router interfaces that permit or deny certain traffic
● Switch - Will be based on MAC address
● Router - Will be based on IP address
● Firewall - Will be based on IP address or port
Using criterion based on:
▪ Source/destination IP
▪ Source/destination port
▪ Source/destination MAC
Firewall Zone
Inside - Corporate/Local network
Outside - Internet
DMZ - Devices that with restricted access from the outside zone (like web servers).
UTM
Unified Threat Management Device (Border device. Physical, Virtualized, or Cloud Solution)
▪ Combines firewall, router, intrusion detection/prevention system, anti-malware, and other features into a single device
IDS
Intrusion Detection System
IPS
Intrusion Prevention System
IDS / IPS Signature-based Detection
Signature contains strings of bytes (a pattern) that triggers detection
IDS / IPS Policy-based Detection
Relies on specific declaration of the security policy
IDS / IPS Statistical Anomaly-based Detection
Watches traffic patterns to build baseline.
IDS / IPS Non-statistical Anomaly-based Detection
Administrator defines the patterns/baseline.
Network-based (NIDS/NIPS)
A network device protects entire network
Host-based (HIDS/HIPS)
Software-based and installed on servers and clients
Remote Access: Telnet / Port
Port 23
▪ Sends text-based commands to remote devices and is a very old networking protocol
▪ Telnet should never be used to connect to secure devices
Remote Access: Secure Shell (SSH) / Port
Port 22
▪ Encrypts everything that is being sent and received between the client and the server
Remote Access: Remote Desktop Protocol (RDP)
Port 3389
▪ Provides graphical interface to connect to another computer over a network connection (Use VPN or RDG for security)
Remote Access: Remote Desktop Gateway (RDG)
▪ Provides a secure connection using the SSL/TLS protocols to the server via RDP (Use for Win 2008 or later OSs)
● Create an encryption connection (No need for VPN)
● Control access to network resources based on permissions and group roles
● Maintain and enforce authorization policies
● Monitor the status of the gateway and any RDP connections passing through the gateway
Remote Access: Virtual Private Network (VPN)
▪ Establishes a secure connection between a client and a server over an untrusted public network like the Internet
Remote Access: Virtual Network Computing (VNC) / Port
Port 5900
▪ Designed for thin client architectures and things like Virtual Desktop Infrastructure (VDI)
Remote Access: Virtual Desktop Infrastructure (VDI)
▪ Hosts a desktop environment on a centralized server
▪ Desktop as a Service (DaaS)
Remote Access: In-Band Management
▪ Managing devices using Telnet or SSH protocols over the network