Section 15: Security Technologies Flashcards

1
Q

Firewall

A

Uses a set of rules defining the traffic types permitted or denied through device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Stateful Firewall

A

Inspects traffic as part of a session and recognizes where the traffic originated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

NGFW

A

NextGen Firewall (OSI Levels 5, 6, 7, using DPI Deep Packet Inspection)
▪ Third-generation firewall that conducts deep packet inspection and packet filtering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

ACL

A

Access Control List
▪ Set of rules applied to router interfaces that permit or deny certain traffic
● Switch - Will be based on MAC address
● Router - Will be based on IP address
● Firewall - Will be based on IP address or port
Using criterion based on:
▪ Source/destination IP
▪ Source/destination port
▪ Source/destination MAC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Firewall Zone

A

Inside - Corporate/Local network
Outside - Internet
DMZ - Devices that with restricted access from the outside zone (like web servers).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

UTM

A

Unified Threat Management Device (Border device. Physical, Virtualized, or Cloud Solution)
▪ Combines firewall, router, intrusion detection/prevention system, anti-malware, and other features into a single device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

IDS

A

Intrusion Detection System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

IPS

A

Intrusion Prevention System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

IDS / IPS Signature-based Detection

A

Signature contains strings of bytes (a pattern) that triggers detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

IDS / IPS Policy-based Detection

A

Relies on specific declaration of the security policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

IDS / IPS Statistical Anomaly-based Detection

A

Watches traffic patterns to build baseline.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

IDS / IPS Non-statistical Anomaly-based Detection

A

Administrator defines the patterns/baseline.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Network-based (NIDS/NIPS)

A

A network device protects entire network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Host-based (HIDS/HIPS)

A

Software-based and installed on servers and clients

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Remote Access: Telnet / Port

A

Port 23
▪ Sends text-based commands to remote devices and is a very old networking protocol
▪ Telnet should never be used to connect to secure devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Remote Access: Secure Shell (SSH) / Port

A

Port 22
▪ Encrypts everything that is being sent and received between the client and the server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Remote Access: Remote Desktop Protocol (RDP)

A

Port 3389
▪ Provides graphical interface to connect to another computer over a network connection (Use VPN or RDG for security)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Remote Access: Remote Desktop Gateway (RDG)

A

▪ Provides a secure connection using the SSL/TLS protocols to the server via RDP (Use for Win 2008 or later OSs)
● Create an encryption connection (No need for VPN)
● Control access to network resources based on permissions and group roles
● Maintain and enforce authorization policies
● Monitor the status of the gateway and any RDP connections passing through the gateway

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Remote Access: Virtual Private Network (VPN)

A

▪ Establishes a secure connection between a client and a server over an untrusted public network like the Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Remote Access: Virtual Network Computing (VNC) / Port

A

Port 5900
▪ Designed for thin client architectures and things like Virtual Desktop Infrastructure (VDI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Remote Access: Virtual Desktop Infrastructure (VDI)

A

▪ Hosts a desktop environment on a centralized server
▪ Desktop as a Service (DaaS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Remote Access: In-Band Management

A

▪ Managing devices using Telnet or SSH protocols over the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Remote Access: Out-of-Band Management

A

▪ Connecting to and configuring different network devices using an alternate path or management network

24
Q

Remote Access Technologies Authentication Considerations

A

▪ Confirms and validates a user’s identity
▪ Gives the user proper permissions to access a resource

25
Remote Access Authentication: PAP
Password Authentication Protocol (PAP) ▪ Sends usernames and passwords in plain text for authentication
26
Remote Access Authentication: CHAP
Challenge Handshake Authentication Protocol (CHAP) ▪ Sends the client a string of random text called a challenge which is then encrypted using a password and sent back to the server
27
Remote Access Authentication: MS-CHAP
▪ Microsoft proprietary version of CHAP that provides stronger encryption keys and mutual authentication
28
Remote Access Authentication: EAP
Extensible Authentication Protocol (EAP) ▪ Allows for more secure authentication methods to be used instead of just a username and a password (Smart Card, Kerberos,...) ▪ Use EAP/TLS in conjunction with a RADIUS or TACACS+ server
29
VPN / Types
Virtual Private Network -Extends a private network across a public network and enables sending and receiving data as if connected on that private network. Three Main Types of VPN: ▪ Site to site - Connect two office ▪ Client to site - Single remote user to ▪ Clientless - Web browsing
30
VPN Communication Method: Full Tunnel
▪ Routes and encrypts all network requests through the VPN connection back to the headquarters - Best for security
31
VPN Communication Method: Split Tunnel
▪ Routes and encrypts only the traffic bound for the headquarters over the VPN, and sends the rest of the traffic to the regular Internet - Best for performance
32
VPN: Clientless
▪ Creates a secure, remote-access VPN tunnel using a web browser without requiring a software or hardware client
33
Secure Socket Layer (SSL)
▪ Provides cryptography and reliability using the upper layers of the OSI model, specifically Layers 5, 6, and 7 ▪ Less Secure so Clientless VPNs are moving toward TLS
34
Transport Layer Security (TLS)
▪ Provides secure web browsing over HTTPS ▪ SSL and TLS use TCP to establish their secure connections between a client and a server (Slower because of the TCP overhead. Could opt. for DTLS.)
35
Datagram Transport Layer Security (DTLS)
▪ UDP-based version of the TLS protocol which operates a bit faster due to having less overhead (Better for Video Streaming, VOIP)
36
VPN Protocol: Layer 2 Tunneling Protocol (L2TP)
Older protocol. Lacks security features like encryption by default and needs to be combined with an extra encryption layer for protection (Still used when used with an encryption protocol.)
37
VPN Protocol: Layer 2 Forwarding (L2F)
Older protocol. Provides a tunneling protocol for the P2P protocol but also lacks native security and encryption features (Not used much)
38
VPN Protocol: Point-to-Point Tunneling Protocol (PPTP)
Supports dial-up networks but also lacks native security features (Microsoft added security features so it is considered pretty secure when used with Windows.)
39
VPN Protocol: IP Security (IPSec)
▪ Provides authentication and encryption of packets to create a secure encrypted communication path between two computers. Most widely used protocol suite used with VPNs.
40
IPSec 5 Step Process
1. Key exchange request 2. IKE (Internet Key Exchange) Phase 1: Main mode or aggressive mode 3. IKE Phase 2 4. Data transfer 5. Tunnel termination
41
Data Transfer Method: Transport Mode
▪ Uses packet’s original IP header (header not protected) and used for client-to-site VPNs ▪ Works well if cannot increase packet size. By default, maximum transmission unit (MTU) size in most networks is 1500 bytes
42
Data Transfer Method: Tunneling Mode
▪ Encapsulates the entire packet and puts another header on top of it ▪ For site-to-site VPNs, you may need to allow jumbo frames
43
AH
Authentication Header ▪ Provides connectionless data integrity and data origin authentication for IP datagrams and provides protection against replay attacks. (No confidentiality of the data.)
44
ESP
Encapsulating Security Payload (No protection for the header.) ▪ Provides authentication, integrity, replay protection, and data confidentiality ▪ In transport mode, use AH to provide integrity for the TCP header and ESP to encrypt it ▪ In tunneling mode, use AH and ESP to provide integrity and encryption of the end payload
45
SNMP
Simple Network Management Protocol (SNMP) is used to send and receive data from managed devices back to a centralized network management station. (Message Types: ▪ Set (Manager to agent request to change value of variable or list of variables.), ▪ Get (Manager to agent to retrieve variable), ▪ Trap (Unsolicited. Sent asynchronously as notifications from agent to manager. Event or alarms.) messages)
46
Syslog
System Logging Protocol (Syslog) - Sends system log or event messages to a central server, called a syslog server ● Security Information Management (SIM) ● Security Event Management (SEM) ● Security Information and Event Management (SIEM)
47
Syslog Level 0
Emergency
48
Syslog Level 1
Alert
49
Syslog Level 2
Critical
50
Syslog Level 3
Error
51
Syslog Level 4
Warning
52
Syslog Level 5
Notice
53
Syslog Level 6
Information
54
Syslog Level 7
Debugging
55
SIEM
Security Information and Event Management (SIEM) ▪ Provides real-time or near-real-time analysis of security alerts generated by network hardware and applications ▪ Uses Syslog protocol to collect data using UDP Port 514 / TCP Port 1468 ▪ Data will be classified based on log level 0-7 ▪ The SIEM will Normalize, Correlate, Aggregate data for further analysis.