Section 16.147 Firewalls Flashcards

Objective 3.2 Given a scenario, you must be able to apply security principles to secure enterprise architecture. Objective 4.5 Given a scenario, you must be able to modify enterprise capabilities to enhance security

1
Q

Firewall

A

A network security device or software that monitors and controls network traffic based on security rules

■ Protects networks from unauthorised access and potential threats

Firewalls can be hardware appliances or specialised software installed on a device to control network traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Screened Subnet (Dual-homed Host)

A

Acts as a security barrier between external untrusted networks and internal trusted networks using a protected host with security measures like a packet-filtering firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Types of Firewalls

Packet Filtering Firewalls

A

● Inspect packet headers for IP addresses and port numbers

● Limited in inspection, operates at Layer 4 (Transport Layer)

Simple header inspection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Types of Firewalls

Stateful Firewalls

A

● Track connections and requests, allowing return traffic for outbound
requests

● Operates at Layer 4, with improved awareness of connection state

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Types of Firewalls

Proxy Firewalls

A

● Make connections on behalf of endpoints, enhancing security

● Two Types of Proxy Firewalls
○ Circuit Level: Session layer(Layer 5)
○ Application Level: Application layer (Layer 7)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Types of Firewalls

Kernel Proxy Firewalls (Fifth Generation Firewall)

A

● Minimal impact on network performance, full inspection of packets at every layer

● Placed close to the system they protect

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Firewall Evolutions

Next Generation Firewall (NGFW)

A

Aims to address the limitations of traditional firewalls by being more aware of applications and their behaviours

● Application-aware: distinguish between different types of traffic

● Conduct deep packet inspection and use signature-based intrusion protection

● Operate fast within minimal network performance impact

● Offer full-stack traffic visibility

● Can integrate with other security products

Can be a problem if organizations become reliant on a single vendor due to firewall configurations tailored to one product line

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Firewall Evolutions

Unified Threat Management (UTM) Firewall

A

Provides the ability to conduct multiple security functions in a single appliance

● Functions include firewall, intrusion prevention, antivirus, and more

● Reduces the number of devices

● UTMs use separate individual engine wheras NGFW used a single engine

Problem: May be cost efective as its one device butit has a single point of failure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Firewall Evolutions

Web Application Firewall (WAF)

A

Focuses on inspecting HTTP traffic that Prevents common web application attacks like cross-site scripting and SQL injections

● Can be placed..

In-line (live attack prevention): Device sits between the network firewall and the web servers

Out of band (Detection) : Device receives a mirrored copy of web server traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Layer based Firewalls

Layer 4 Firewall

A

● Operates at the transport layer

● Filters traffic based on port numbers and protocol data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Layer based Firewalls

Layer 7 Firewall

A

● Operates at the application layer

● Inspects, filters, and controls traffic based on content and data
characteristics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly