Security Technologies (1.5, 2.1, 3.1, 4.1, 4.3 & 4.4) Flashcards
Firewall
o Uses a set of rules defining the traffic types permitted or denied through device
▪ Software or hardware
▪ Virtual or physical
▪ Host-based or network-based
▪ Can perform Network Address Translation (NAT) and/or Port Address
Translation (PAT)
Stateful Firewall
▪ Inspects traffic as part of a session and recognizes where the traffic
originated
NextGen Firewall (NGFW)
▪ Third-generation firewall that conducts deep packet inspection and
packet filtering
Access Control List (ACL)
▪ Set of rules applied to router interfaces that permit or deny certain traffic
Switch
o MAC address
Router
o IP address
Switch Firewall
o IP address or port
▪ Source/destination IP
▪ Source/destination port
▪ Source/destination MAC
Firewall Zone
▪ Firewall interface in which you can set up rules
Inside
o Connects to corporate LAN
Outside
o Connects to the Internet
Demilitarized Zone (DMZ)
o Connects to devices that should have restricted access
from the outside zone (like web servers)
Unified Threat Management (UTM) Device
▪ Combines firewall, router, intrusion detection/prevention system, antimalware, and other features into a single device
Signature-based Detection
▪ Signature contains strings of bytes (a pattern) that triggers detection
Policy-based Detection
▪ Relies on specific declaration of the security policy
Statistical Anomaly-based Detection
▪ Watches traffic patterns to build baseline
Non-statistical Anomaly-based Detection
▪ Administrator defines the patterns/baseline
Network-based (NIDS/NIPS)
o A network device protects entire network
Host-based (HIDS/HIPS)
o Software-based and installed on servers and clients
▪ Network and host-based systems can work together for a more complete
protection
Telnet Port 23
▪ Sends text-based commands to remote devices and is a very old
networking protocol
▪ Telnet should never be used to connect to secure devices
Secure Shell (SSH) Port 22
▪ Encrypts everything that is being sent and received between the client
and the server
Remote Desktop Protocol (RDP) Port 3389
▪ Provides graphical interface to connect to another computer over a
network connection
Remote Desktop Gateway (RDG)
▪ Provides a secure connection using the SSL/TLS protocols to the server
via RDP
● Create an encryption connection
● Control access to network resources based on permissions and
group roles
● Maintain and enforce authorization policies
● Monitor the status of the gateway and any RDP connections
passing through the gateway
Virtual Private Network (VPN)
▪ Establishes a secure connection between a client and a server over an
untrusted public network like the Internet
Virtual Network Computing (VNC) Port 5900
▪ Designed for thin client architectures and things like Virtual Desktop
Infrastructure (VDI)
Virtual Desktop Infrastructure (VDI)
▪ Hosts a desktop environment on a centralized server
▪ Desktop as a Service (DaaS)
In-Band Management
▪ Managing devices using Telnet or SSH protocols over the network
Out-of-Band Management
▪ Connecting to and configuring different network devices using an
alternate path or management network
▪ Prevents a regular user’s machine from connecting to the management
interfaces of your devices
▪ Out-of-band networks add additional costs to the organization
Authentication
▪ Confirms and validates a user’s identity
▪ Gives the user proper permissions to access a resource
Password Authentication Protocol (PAP)
▪ Sends usernames and passwords in plain text for authentication
Challenge Handshake Authentication Protocol (CHAP)
▪ Sends the client a string of random text called a challenge which is then
encrypted using a password and sent back to the server
MS-CHAP
▪ Microsoft proprietary version that provides stronger encryption keys and
mutual authentication
Extensible Authentication Protocol (EAP)
▪ Allows for more secure authentication methods to be used instead of just
a username and a password
▪ Use EAP/TLS in conjunction with a RADIUS or TACACS+ server
Virtual Private Networks (VPNs)
o Extends a private network across a public network and enables sending and
receiving data across shared or public networks
▪ Site to site
▪ Client to site
▪ Clientless
Virtual Private Networks (VPNs)
o Extends a private network across a public network and enables sending and
receiving data across shared or public networks
▪ Site to site
▪ Client to site
▪ Clientless