Security Technologies Flashcards
Firewall
Uses a set of rules to prevent or allow access
Packet-Filtering Firewall
Permits or denies traffic based on packet header
Stateful Firewall
Inspects traffic as part of a session
NGFW
third gen firewall that conducts deep packet inspection and packet filtering (operates a 5, 6 and 7 of the OSI)
Firewall Zone
Firewall interface in which you set up rules
Unified Threat Management Device (UTM)
Combines firewall, router, intrusion detection/prevention system, anti-malware, and other features into a single device
Telnet
plain text remote access; port 23
RDG (Remote Desktop Gateway)
provides a secure connection using the SSL/TLS protocols for rdp
Virtual Network Computing (VNC)
Designed for thin client architecture; Port 5900
VDI
Hosts a desktop in a virtual environment
In-Band Management
Managing devices with telnet or ssh inside the network
out of band
managing outside the network; separate network; serial cable or console port is out of band
CHAP (Challenge Handshake Authentication Protocol)
Sends the client a string of random text called a challenge which is then encrypted using a password and sent back to the server
site to site vpn
connect two offices together
Full tunnel vpn
routes and encrypts all network requests through the VPN connection back to the headquarters
split tunnel vpn
routes and encrypts only the traffic bound for the headquarters over the VPN, and sends the rest of the traffic to the regular internet
Clientless VPN
creates a secure connection through a web browser
Layer 2 Forwarding (L2F)
Provides a tunneling protocol for the P2P protocol but also lacks native security and encryption features
IPSec
Provides auth and encryption for VPN
What are the 5 IPSec steps?
Key exchange request, IKE Phase 1, IKE Phase 2, Data transfer, Tunnel termination
Managed Device
Any device that can communicate with an SNMP manager known as the management information base (MIB)
Granular Trap
Sent trap messages get a unique objective identifier to distinguish each message as a unique message being received
Management Information Base (MIB)
The structure of the management data of a device subsystem using hierarchical namespace containing object identifiers; don’t send redundant info just changes
Verbose
SNMP traps may be configured to contain all the information
SNMPv3
Provides three security enhancements which added integrity, authentication and confidentiality to the SNMP protocol
System Logging Protocol (Syslog)
Sends system log or even messages to a central server, called a syslog server
Syslog level 0
emergency
1
Alert
2
Critical
3
Error
Warning
4
5
Notice
Information
6
Debugging
7