Section 16 - Securing Networks Flashcards

1
Q

What are some examples of network devices?

A

Switches, routers, firewalls, IDS, IPS and more

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a default account?

A

A user or administrator-level account that is installed on a device by the manufacturer during production

** These are the accounts that already are established when you buy a small office, home office wireless access point.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How do you prevent a weak password?

A

It should be long, strong and complex. This should require at least 14 characters with a mix of uppercase, lowercase, numbers and special characters.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is privilege escalation?

A

Occurs when a user is able to gain rights of another user or administrator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Privilege escalation happens in one of two ways, which are?

A

Vertically or Horizontally

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How does vertical privilege escalation work?

A

It goes from a user up to an administrator account thus going upwards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How does horizontal privilege escalation work?

A

It goes from one user to another. For example, if you and I both work in the an organization and we both have user accounts, and I break into your account that’s considered a horizontal privilege escalation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a backdoor?

A

A way of bypassing normal authentication in a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the keys to having network security?

A

Having an IPS, proper firewall configs, network segmentation, and firmware updates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Why is Telnet a network security concern?

A

It is unsecure and it passes your information in the clear, meaning that it’s not encrypted. Anyone who is on that network can see your usernames, your passwords and the commands you’re sending.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is network media?

A

This is the cabling that makes up our network. This can be copper, fiber optic, and coaxial cabling that is used as the connectivity in a wired network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is EMI?

A

Electromagnetic Interference is a disturbance that can affect electrical circuits, devices, and cables due to the radiation or electromagnetic conduction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How do we minimize EMI?

A

Install shielding around the cables or the source using STP (Shielded Twisted Pair)

*** STP cables have foiled around them that prevent emanations out of the cable or interference entering into the cable which is a double benefit since it keeps things out and it keeps things in.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is RFI?

A

Radio Frequency Interference

This is a disturbance that can affect electrical circuits, devices and cables due to AM/FM transmissions or cell towers

*** Like EMI, this disturbance can affect your circuits, devices and cables except it does so by radio waves as opposed to electrical waves.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is crosstalk?

A

Occurs when a signal transmitted on one copper wire creates and undesired effect on another wire

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How do you prevent crosstalk?

A

Networks should always use a 110 block

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Why do companies commonly avoid using STP cables?

A

Most organizations use UTP (unshielded twisted pair) because it is cheaper and easier to work with (like 50% cheaper)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is data emanation?

A

The electromagnetic field generated by a network cable or device when transmitting

*** Like EMI except this comes from INSIDE your cable. This generates a field around that cable that when transmitting information over a network can be picked by someone.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is a good way to prevent data emanations from happening?

A

Switch your networks to fiber optic cables because they don’t have emanation at all this is due to them working with light and therefore there is no radiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is a PDS?

A

Protected Distribution System

Secured system of cable management to ensure that the wired network remains free from eavesdropping, tapping, data emanations and other threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is wire tapping?

A

Wiretapping, also known as wire tapping or telephone tapping, is the monitoring of telephone and Internet-based conversations by a third party, often by covert means.

Such as cutting wires and soldering on additional wires in order to copy data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What are some of the basic vulnerabilities associated with wireless networks?

A
  1. Administrative access on the wireless access point - make sure to change the default username and passwords when buying new devices
  2. Remote administration - make sure this is disabled. Turn it off and make sure you’re doing these changes locally inside your network.
  3. Service Set Identifier (SSID) - disable the broadcast so clients have to know the name of it prior to connecting to it
  4. Rogue Access Points
  5. Evil Twin
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is remote administration?

A

This is something that allows you to connect over the internet and then make changes to your wireless access point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is SSID?

A

This is what uniquely identifies the network and it acts as the name of the wireless access point that the clients are going to use to connect to it

25
Q

What is a Rogue Access Point?

A

An unauthorized WAP or Wireless Router that allows access to the secure network.

***An unauthorized wireless access point or wireless router that somebody connected to your network and it’s going to give access to your secure network.

26
Q

How do you prevent Rogue Access Points?

A

Enable MAC filtering on the network, network access control, run a good IDS/IPS on your network that can detect these devices when they initially try to connect

27
Q

What is an Evil Twin?

A

A rogue, counterfeit, and unauthorized WAP with the same SSID as your valid one

28
Q

How do you prevent encountering an Evil Twin?

A

Make sure that your wireless clients are configured to use a VPN whenever they connect over Wi-Fi

29
Q

What is a pre-shared key?

A

Same encryption key is used by the access point and the client

*** most wireless encryption schemes rely on this. This is when the access point and the client use the same encryption key to encrypt and decrypt the data. The difficulty with this is that scalability becomes problematic.

30
Q

What are the three main types of encryption?

A

WEP
WPA
WPA2

31
Q

What is WEP?

A

Wired Equivalent Privacy

Original 802.11 wireless security standard that claims to be as secure as a wired network

32
Q

What is the main problem with WEP?

A

a 24-bit initialization vector or IV that it uses in establishing connection and it’s sent in clear text. This makes it not secure.

*** The big thing to remember for WEP is Initialization vector

33
Q

What is WPA?

A

WiFi Protected Access

Replacement for WEP which uses TKIP, Message Integrity Check (MIC) and RC4 encryption

*** The big thing to remember for WPA is RC4 and TKIP

34
Q

What is WPA2?

A

WiFi Protected Access version 2

802.11i standard to provide better wireless security featuring AES with a 128-bit key, CCMP, and integrity checking

*** The big thing to remember for WPA2 is AES and CCMP

35
Q

If on the exam you’re asked about Wi-Fi and it uses the word “Open” in the question, it’s usually looking for some kind of answer that says…?

A

That the network has no security or no protection

36
Q

What is WPS?

A

Wi-FI Protected Setup

Automated encryption setup for wireless networks at a push of a button but is severely flawed and vulnerable

** Always disable WPS. This is because it relies on an eight digit code that when sent is actually broken up into two four digit chunks. This is very easy for a computer to brute force it’s way into cracking as it has only around 10,000 possible combinations.

37
Q

Wireless security also relies upon proper…?

A

WAP placement

38
Q

What are some ways to mitigate your WAP signal from being accessed?

A

Use directional antennas to control radiation bleed over. This allows the signal to emanate only out into controlled patterns (areas)

Turn down the power level that you’re radiating at to minimize the distance being covered by your signal and keep it inside your building

Understand what type of WAP you’re using. B, G, N, or AC? All of these use a different frequency and thus have different wavelengths.

39
Q

What is jamming?

A

Intentional radio frequency interference targeting your wireless network to cause a denial of service condition

40
Q

How can you determine what signals around your office may be causing jamming or interference?

A

Conduct a wireless site survey or using a spectrum analyzer which will allow you to see what frequencies are in use and how strong they are to see if they’re having an effect on your network

In addition to this, most wireless access points do have some built in security features that you can configure as well. This includes basic firewalls with stateful packet inspection, MAC filtering, disabling your SSID broadcast and different levels of encryption.

41
Q

Some more advanced WAPs feature AP. What is this?

A

AP Isolation creates network segment for each client when it connects to prevent them from communicating with other clients on the network

42
Q

What is War Driving?

A

Act of searching for wireless networks by driving around until you find them

** The reason an attacker does this is because by connecting to your network then the attack manifests through your network so it traces back to you and not them.

43
Q

What is Walk Chalking?

A

Act of physically drawing symbols in public places to denote the open, closed, and protected networks in range

44
Q

What is an IV attack?

A

Occurs when an attacker observes the operation of a cipher being used with several different keys and finds a mathematical relationship between those keys to determine the clear text data

45
Q

What is WiFi Dissociation Attack?

A

Attack that targets an individual client connected to a network, forces it offline by de-authenticating it and then captures the handshake when it reconnects

46
Q

What is a Brute Force Attack?

A

Occurs when an attacker continually guesses a password until they get it correct

** Any password can be brute forced, that’s why it’s important to make your passwords long and complicated because these can take up to a million years to crack.

47
Q

What is WPA3?

A

Wi-Fi Protected Access 3

Introduced in 2018 to strength WPA2

48
Q

What are the two modes of WPA3?

A

Enterprise Mode
Personal Mode

49
Q

What is the difference between WPA3 Enterprise and Personal mode?

A

Enterprise is a business use case that gives additional security

50
Q

What was the biggest change that came with WPA3?

A

Removal of the pre-shared key exchange (PSK.) Instead, it uses what’s known as SAE (Simultaneous Authentication of Equals)

51
Q

What is SAE?

A

Simultaneous Authentication of Equals

This is a secure password based authentication and password authenticated key agreement method. It uses forward secrecy (AKA perfect forward secrecy) that provides assurance that the sessions keys will not be compromised

52
Q

How does forward secrecy work?

A

A five step process:

  1. The AP and the client use a public key system to generate a pair of long-term keys
  2. The AP and the client exchange a one-time use session key using a secure algorithm like Diffe-Hellman
  3. The AP sends the client messages and encrypts them using the session key created in Step 2
  4. Client decrypts the messages received using the same one-time use session key
  5. The process repeats for every message being sent, starting at Step 2 to ensure forward secrecy
53
Q

What is bluejacking?

A

Sending of unsolicited messages to Bluetooth-enabled devices such as mobile phones and tablets

54
Q

What is bluesnarfing?

A

Unauthorized access of information from a wireless device through a bluetooth connection

55
Q

What is the difference between bluejacking and bluensnarfing?

A

Bluejacking send informations and Bluesnarfing takes information

56
Q

What is RFID?

A

Radio Frequency Identification

Devices that use a radio frequency signal to transmit identifying information about the device or token holder

Ex. swiping credit cards or key fobs

57
Q

How does RFID create security problems?

A

It can operate from 10cm to 200 meters depending on the device. Because of the distance it can travel, this creates the ability for eavesdropping, the ability to capture, replay and rebroadcast its radio frequency as part of a larger attack.

58
Q

What is NFC?

A

Near Field Communication

Allows two devices to transmit information when they are within close range through automated pairing and transmission

** This was invented to combat issues with RFID