Section 4: Security Applications and Devices Flashcards
What are Firewalls?
Dedicated pieces of hardware sat at the edge of your network and control inbound/outbound traffic
What do Firewalls control
Inbound / Outbound traffic
What are Personal Firewalls?
Software application that protects a single computer or server from unwanted internet traffic
- also referred to as Host-Based Firewalls
- apply set of rules or policies against inbound/outbound traffic
What is port 80?
HTTP
What is port 443?
HTTPS
What is port 22?
SSH
What is port 23?
Tel Net
Should you allow traffic from Port 80 & 443 on a personal computer?
No, there is no need
Does Windows have a built-in Firewall?
Yes
- Windows Firewall
What are the 2 types of Windows Firewall?
- Basic
- Advanced
- Windows Firewall with Advanced Security
- wf.msc in cmd
Does OS X have a built-in Firewall?
Yes
- PF (terminal version)
- Packet Filter
Does Linux have a built-in Firewall?
Yes
- iptables
- configured from terminal using different accept / reject rules
What are Host-Based Firewalls?
Same as Personal Firewalls. Installed directly on the computer as a software application
Do Host-Based Firewalls need to be updated regularly?
Yes
What do Host-Based Firewalls use up in a computer system?
Processing Power
Due to Host-Based Firewalls using Processing Power, what do most organisations rely on instead?
- Hardware Firewall
- Network Firewall
- some routers have built-in firewalls
- still a good practice to run personal software firewall and network based firewall
What does an IDS do?
Intrusion Detection System
- alerts and logs when a detection occurs
What does an IPS do?
Intrusion Prevention (Protection) System
- alerts, logs, and takes action against the intrusion
What is an IDS? (definition)
Device or software that monitors a system or network and analyses the data passing through it in order to identify an incident or attack
What are the 2 different varieties of IDS?
- HIDS
- Host-based IDS - NIDS
- Network-based IDS
What is a HIDS?
Host-based IDS
- usually a software
- installed on computer/server
- logs everything suspicious
What is a NIDS?
Network-based IDS
- hardware installed on network
- traffic goes through that switch
- copy gets passed down to NIDS
- if suspicious, it logs and alerts
What are the 3 detection methods of IDS/IPS?
- Signature
- Policy
- Anomaly-based
How does Signature-based detection work?
A specific string of bytes trigger an alarm
- reads through database containing these strings and compares
- constantly searching for specific combination of letters/bytes
How does Policy-based detection work?
Relies on specific security policy the user created
i.e. No Telnet Authorised
- if a system trying to connect to port 23, it will flag, log, and alert
How does Anomaly-based (or Statistically Anomaly Based Detection) work?
Analyses current traffic against an established baseline, and triggers an alert if it is outside the statistical average
- e.g. monitoring a network
- everyone is working 9.5
- but someone is downloading large amounts of data at 2am which is outside the normal baseline
- it will be flagged & alerted
What are the 4 types of Alert?
- True Positive
- True Negative
- False Positive
- False Negative
What does True Positive mean?
The system is POSITIVE there is a threat and it is TRUE
What does True Negative mean?
The system does NOT think there is a threat, and it is TRUE (works as intended)
What does False Positive mean?
The system is POSITIVE that there is a threat but it is FALSE, there is no threat
What does False Negative mean?
The system does NOT think there is a threat, but it is FALSE, there is a threat and it was not detected.