Securing the Network Flashcards

1
Q

DMZ

A
• Demilitarized zone 
—An additional layer of security between 
the Internet and you 
—Public access to 
public resources
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Extranet

A
•A private network for partners 
—Vendors, suppliers 
• Usually requires additional 
authentication 
—Only allow access to 
authorized users
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Intranet

A
• Private network 
—Only available internally 
• Company announcements, 
important documents, 
other company business 
—Employees only 
• No external access 
—Internal or VPN access only
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Wireless networking

A

•The convenience of wireless
—The security concerns of wireless
• Internal use
—Perhaps configure a separate
wireless network for guests
• Users authenticate to the wireless network
—Use their normal network login credentials
—802. IX standard
—Integrates into the existing name services
—No shared wireless passphrase

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Guest network

A
•An optional network 
—But convenient to provide 
—Meetings, demonstrations, etc 
• No access to the internal network 
—Internet access only 
• Integrate with a captive portal 
—Avoid unauthorized use of the network 
—Useful in congested areas 
—Keeps employees off the guest network
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Ad hoc

A

•Wireless without an access point
—Point to point communication
• Common on mobile devices
—AirDrop, contact sharing apps
• Difficult to control on unmanaged devices
—Configure ad hoc settings through the MDM
• Implement network access control
—Use ad hoc, but only with the right credentials
—Limit application use for ad hoc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Honeypots and honeynets

A
•Attract the bad guys 
—And trap them there 
•The bad guys are probably a machine 
—Makes for interesting recon 
• Honeypots 
—Single-use/single-system traps 
• Honeynets 
—More than one honeypot on a network 
—More than one source of information
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

NAT - Network Address Translation

A

• It is estimated that there are over
20 billion devices connected
to the Internet (and growing)
—IPv4 supports around 4.29 billion addresses
•The address space for IPv4 is exhausted
—There are no available addresses to assign
• How does it all work?
— Network Address Translation
•This isn’t the only use of NAT
—NAT is handy in many situations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

NAT and security

A

• NAT is not a security mechanism!
—There’s no protection there
• Security through obscurity
—The premise: If you can’t see it, you can’t attack it
—This isn’t security at all
• Bad guys can circumvent an unprotected NAT
—Sophisticated attacks already assume NAT is in place
—They will gain access to your internal devices, even with NAT in place
•A stateful firewall is the security mechanism
—Used in conjunction with NAT to provide security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Segmenting the network

A

• Physical, logical, or virtual segmentation
—Devices, VLANs, virtual networks
• Performance
—High-bandwidth applications
• Security
— Users should not talk directly to database servers
—The only applications in the core are SQL and SSH
• Compliance
—Mandated segmentation (PCI compliance)
—Makes change control much easier

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Physical segmentation

A

• Devices are physically separate
—Switch A and Switch B
• Must be connected to provide communication
—Direct connect, or another switch or router
• Web servers in one rack
—Database servers on another
• Customer A on one switch, customer B on another
—No opportunity for mixing data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Physical segmentation

A

• Separate devices

—Multiple units, separate infrastructure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Logical segmentation with VLANs

A

•Virtual Local Area Networks (VLANs)
—Separated logically instead of physically
—Cannot communicate between VLANs without a Layer 3 device / router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Virtualization

A
• Get rid of physical devices 
—All devices become virtualized 
• Servers, switches, routers, firewalls, load balancers 
—All virtual devices 
• Instant and complete control 
—Build a new network 
—Route between IP subnets 
—Drop a firewall between 
—Drag and drop devices between networks
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Air gaps

A

• One step farther than physical segmentation
—Physical segmentation usually has some connectivity
• Remove any connectivity between components
—No possible way for one device to communicate to another
—No shared components
• Network separation
—Secure networks
—Industrial systems (SCADA, manufacturing)
• Some technologies can jump the gap
—Removable media

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Site-to-Site VPNs

A

• Encrypt traffic between sites
—Through the public Internet
• Use existing Internet connection
—No additional circuits or costs

17
Q

Host-to-Site VPNs

A

• Also called “remote access VPN”
• Requires software on the user device
—May be built-in to existing operating system

18
Q

Host-to-Host VPNs

A

• User to user encryption
• Software-based
—No hardware needed

19
Q

Sensors and collectors

A

• Gather information from network devices
—Built-in sensors, separate devices
—Integrated into switches, routers, servers, firewalls, etc.
• Sensors
—Intrusion prevention systems, firewall logs, authentication logs,
web server access logs, database transaction logs, email logs
• Collectors
—Proprietary consoles (IPS, firewall),
SIEM consoles, syslog servers
—Many SIEMs include a correlation engine
to compare diverse sensor data

20
Q

Filters and firewalls

A
• Packet filters 
—Simple data blocks - ignores state 
—Linux iptables - filter packets in the kernel 
—Usually placed on a device or server 
• Firewalls 
— State-based 
—Advanced filtering by IP address, port, 
application, content 
—Usually located on the 
ingress/egress of a network 
—Some organizations place them 
between internal networks
21
Q

Proxy servers

A
•An intermediate server 
—Client makes the request to the proxy 
—The proxy performs the actual request 
—The proxy provides results back to the client 
• Useful features 
—Access control, caching, 
URL filtering, content scanning
22
Q

Forward proxy

A

• Protect users from the Internet

23
Q

VPN concentrators

A

•VPN appliances are usually located
on the edge of the network
—Internet-facing
• Sites connect from one site to another across the Internet

24
Q

SSL accelerators

A
•The SSL handshake requires 
some cryptographic overhead 
—Requires a lot of CPU cycles 
• Offload the SSL process to a hardware accelerator 
—Often integrated into a load balancer
25
Q

Load balancers

A
• Manage the load across 
multiple devices 
—The user has no idea 
—Placed between the users and the service 
• Servers can be added and removed 
—Real-time response to load 
• Load balancer performs 
constant health checks 
—If a server disappears, 
it is removed from the rotation
26
Q

DDoS mitigation

A

• Resist a distributed denial of service attack
—Minimize the impact
• Cloud-based
— Internet provider or reverse proxy service
• On-site tools
—DDoS filtering in a firewall or IPS
• Positioned between you and the Internet
— Literally you against the world

27
Q

Aggregation switches

A

Aggregation switches

28
Q

Taps and port mirrors

A

• Intercept network traffic
- 3.2
—Send a copy to a packet capture device
• Physical taps
—Disconnect the link, put a tap in the middle
—Can be an active or passive tap
• Port mirror
—Port redirection, SPAN (Switched Port ANalyzer)
—Software-based tap
—Limited functionality, but can work well in a pinch

29
Q

SDN (Software Defined Networking)

A
• Networking devices have two 
functional planes of operation 
—Control plane, data plane 
• Directly programmable 
—Configuration is different than forwarding 
• Agile 
—Changes can be made dynamically 
• Centrally managed 
—Global view, single pane of glass 
• Programmatically configured 
—Orchestration 
—No human intervention 
• Open standards / vendor neutral 
—A standard interface to the network
30
Q

SDN Security

A

Load balancer placed between firewall/IPS and web servers