Security Technologies Flashcards
Firewall
Uses a set of rules defining the traffic types permitted or denied through device
▪ Software or hardware
▪ Virtual or physical
▪ Host-based or network-based
▪ Can perform Network Address Translation (NAT) and/or Port Address
Translation (PAT)
Stateful Firewall
Inspects traffic as part of a session and recognizes where the traffic
originated
NextGen Firewall (NGFW)
Third-generation firewall that conducts deep packet inspection and
packet filtering
Access Control List (ACL)
Set of rules applied to router interfaces that permit or deny certain traffic
● Switch
o MAC address
● Router
o IP address
Switch Firewall
o IP address or port
▪ Source/destination IP
▪ Source/destination port
▪ Source/destination MAC
Firewall Zone
▪ Firewall interface in which you can set up rules
● Inside
o Connects to corporate LAN
● Outside
o Connects to the Internet
● Demilitarized Zone (DMZ)
o Connects to devices that should have restricted access
from the outside zone (like web servers)
Unified Threat Management (UTM) Device
▪ Combines firewall, router, intrusion detection/prevention system, antimalware, and other features into a single device
Signature-based Detection
Signature contains strings of bytes (a pattern) that triggers detection
Policy-based Detection
▪ Relies on specific declaration of the security policy
Statistical Anomaly-based Detection
Watches traffic patterns to build baseline
Non-statistical Anomaly-based Detection
▪ Administrator defines the patterns/baseline
● Network-based (NIDS/NIPS)
o A network device protects entire network
● Host-based (HIDS/HIPS)
o Software-based and installed on servers and clients
▪ Network and host-based systems can work together for a more complete
protection
Telnet Port 23
Sends text-based commands to remote devices and is a very old
networking protocol
▪ Telnet should never be used to connect to secure devices
Secure Shell (SSH) Port 22
Encrypts everything that is being sent and received between the client
and the server
Remote Desktop Protocol (RDP) Port 3389
Provides graphical interface to connect to another computer over a
network connection
o Remote Desktop Gateway (RDG)
▪ Provides a secure connection using the SSL/TLS protocols to the server
via RDP
● Create an encryption connection
● Control access to network resources based on permissions and
group roles
● Maintain and enforce authorization policies
● Monitor the status of the gateway and any RDP connections
passing through the gateway
Virtual Private Network (VPN)
▪ Establishes a secure connection between a client and a server over an
untrusted public network like the Internet
o In-Band Management
Managing devices using Telnet or SSH protocols over the network
Out-of-Band Management
▪ Connecting to and configuring different network devices using an
alternate path or management network
▪ Prevents a regular user’s machine from connecting to the management
interfaces of your devices
▪ Out-of-band networks add additional costs to the organization
Password Authentication Protocol (PAP)
Sends usernames and passwords in plain text for authentication
Challenge Handshake Authentication Protocol (CHAP)
Sends the client a string of random text called a challenge which is then
encrypted using a password and sent back to the server