topic 4B : networks and security Flashcards

1
Q

Basics of a firewall (1)

A

What is a firewall?
- a network device; hardware, software, or a combination, that controls access between your private network (LAN) and an external network (Internet)

  • enforces security policy across its connections

security policy : a set of rules defines what traffic is permissible and what traffic is to be blocked/denied

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Basics of a firewall (2)

A
  • border firewall :
    firewalls places between an organization’s internal trusted network and an external untrusted network, usually the internet
  • ingress filtering :
    examines packets coming into the organization
  • egress filtering :
    examines packets going out of the organization
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Security zones

A

firewalls are used to create security zones and enforce security policies

different zones provide Layers of defense:
- outermost layer provides basic protection
- innermost layers provide the highest level of protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Different zones in security zones

A

1) untrusted zone
- the outermost zone (Internet)

2) trusted zone
- internal network (inner secured corporate network)

3) semi-trusted zone
- demilitarized zone (DMZ), also known as perimeter network
- lies between the internal network (trusted zone) and the internet (untrusted zone)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Demilitarized zone (DMZ)

A

purpose : to add an additional layer of security to an organization’s LAN

outside users can access the DMZ but cannot access the secure internal network

any services that are being provided to Internet users are placed in the DMZ

most common services :
- web servers
- mail servers
- FTP (file transfer protocol) servers
- DNS (domain name system) servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Intrusion detection system (IDS)

A
  • a device/software application that monitors network and/or system activities for possible incidents

incidents can be malicious activities or policy violations

examples :
- malware (worms, spyware etc)
- attackers gaining unauthorized access to systems from the Internet
- authorized users of systems who misuse their privileges or attempt to gain additional privileges for which they are not authorized

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Purposes of IDS

A

1) identify suspicious/malicious activities
2) note activity that deviates from normal behavior
3) catalog and classify the activity
4) respond to the activity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

False positives and negatives of IDS

A

false positives : IDS matches a pattern and generates an alarm for non-hostile traffic

false negatives : hostile activity that does not match an IDS signature and goes undetected

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Two main categories of IDS

A

1) Host-based IDS
- monitors the activities based on an individual system but has no visibility of the activities on the network or systems around it

2) Network-based IDS
- monitors the traffic crossing the network link but has no idea of what is happening on individual systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Host-based IDS (HIDS)

A

What is HIDS?
- consists of an agent installed on a host (server or computer)
- monitors system integrity, application activity, file changes, system logs and application logs
- uses local system resources to operate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Pros and cons of HIDS

A

advantages :
- can analyze activities at a high level of detail
- examines data after decryption
- reduces false positives rates

disadvantages :
- consume local resources (eg processing time, storage & memory)
- high cost of ownership (in terms of deployment and maintenance)
- focused view and cannot relate to activity around it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Network-based IDS (NIDS)

A

What does NIDS do?
- reside on network segment and monitor traffic on that network segment

examines network traffic as it passes by :
- bits and bytes travelling through cables interconnecting the systems
- analyzes traffic by protocol, type, size, source, destination, content etc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Pros and cons of NIDS

A

advantages :
- lower cost of ownership, deployment and maintenance
- NIDS are mostly passive devices = minimum overheads on network
- has visibility into all network traffic and can correlate attacks among multiple systems

disadvantages :
- ineffective when traffic is encrypted
- must be able to handle high volumes of traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Activites that HIDS and NIDS can monitor

A

activities which HIDS can monitor :
- login at odd hours
- login authentication failures
- add new user accounts (especially with admin rights)
- modification/access of critical system files (eg registry, where official records and documents are kept)
- start or stop processes (eg antivirus)
- privilege escalation

activities that NIDS can monitor :
- DoS attacks
- port scans/sweeps
- malicious content in data payload of packets
- vulnerability scanning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Are IDS and Firewall the same?

A

firewall :
- device/software that sits between a local network and the internet.
- main function is to block unauthorized access while permitting authorized communications

IDS :
- device/software installed on the network (NIDS) or host (HIDS). main function is to detect and report intrusion attempts inside the host or network

conclusion : firewall is like a security guard while IDS is a security camera inside the compound

How well did you know this?
1
Not at all
2
3
4
5
Perfectly