Section 3.2 Flashcards
What are security zones?
Security zones allows us to zone the devices in our network based on their use or access type.
What is the Attack Surface?
Attack surface is the combination of potential openings into our surface. Different attack surfaces may be:
- application code
- authentication process
- open ports
- human error
Explain IPS
Intrusion Prevention System watches network traffic and prevents intrusion through exploits to OS, application etc by different attack types such as buffer overflows, XSS, etc.
Explain IDS
Intrusion Detection System sends an alert if an intrusion occurs in a system.
What is a Fail-open mode?
When a system fails, data continues to flow
What is a Fail-closed mode?
When a system fails, data does not flow.
What is active monitoring solution?
System is connected inline and data can be blocked in real time as it passes by the IPS system. This is commonly used when real time monitoring and security is desired.
What is a passive monitoring solution?
System sends a copy of the network traffic to the IPS to monitor the traffic, but since this is a copy of the data, the IPS cannot block traffic in real time. Mostly used when the system wants to be easier on blocking traffic in case the IPS blocks good traffic by accident.
What is a jump server?
A jump server is a device in the inside of the network that is usually accessible from the outside.
What is a proxy server?
A proxy server sits between the users and the external network. The proxy server receives the user requests and sends the request on their behalf to the external network.
What is EAP?
Extensible Authentication Protocol (EAP) is an authentication framework that is part of port security.
EAP integrates with 802.1X which prevents access to the network until the authentication succeeds.
What is NAC?
Port Based Network Access Control (NAC) is another way to say 802.1X, which means that you dont get access to the network until you authenticate.
What is a UTM?
Unified Threat Management (UTM) device has features such as URL filtering, malware inspection, spam filters, firewall, IDS/IPS.
What is NGFW?
Next-generation Firewall (NGFW) operate at OSI Layer 7 and are able to examine all traffic passing the network, determine what applications are being used based on the traffic type, and set controls based on specific services or applications.
What is a WAF?
Web Application Firewall (WAF) monitors web based inputs such as HTTPS/HTTP and puts rules to allow or deny based on expected input.