Security Operations 4.5 Flashcards
Given a scenario, modify enterprise capabilities to enhance security
Firewall
Filter traffic by port number or application.
Traditional - filter by port number
NGFW - Filter by application.
Encrypt traffic - VPN between sites.
Most firewalls can be layer 3 devices. Often sits on the ingress.egress of the network.
NGFW
Most advance firewall which sits at the top of the OSI model - application layer
Layer 7 firewall.
Performs deep-packet inspection adding application level inspection as a core feature.
Ports and Protocols
Traditional firewall which makes forwarding decisions based on TCP or UDP port numbers.
They either allow or disallow traffic based on destination protocol and port.
What is the the ingress egress of the network?
The point that separates the internet from the internal part of the internet.
Screened subnet
Commonly holds data that needs to be accessed by people on the internet. But keeps private data separate on the internal network.
IPS
Intrusion prevention system
Host based firewalls
Monitor traffic going in and out of a single host.
Network based firewall
Protect an entire network
Stateless firewall
Uses rules implemented in ACL’s to identify allowed and blocked traffic. Rules are based on
- Permission
- Protocol
- Source
-Port or protocol
Stateful Firewalls
Inspects traffic and makes decisions based on the traffic context or state.
Layer 4 firewalls
Operate on the transport model of the OSI model. They inspect traffic and make decisions based on the traffic context or state.
Web application firewall
Specfically designed to protect a web application. A web server hosts the web application, and the WAF is place between the web server and web server clients.
Level 7
URL Scanning.
Allow or restrict based on Uniform resource location.
Agent Based
Installed on client software on the user’s device. Usually managed from a central console.
Proxies
Sit between the users and the external network. Control of traffic managed through the proxy.
The proxy makes requests on behalf of the user. The proxy makes a decision based on what it receives on whether it wants to pass that response onto the end user.
Forward Proxy
The user and the proxy are internal network of the organisation.