Topic 8 - Implementing Network Security Flashcards
What are two advantages of RBAC
Easier to implement, low security cost
Explain Secure Boot
Feature ensures that a computer boots using only software that is trusted by the computer manufacturer
Explain Measured Boot
This feature sends a log of components loaded prior to the anti-malware software so that the anti-malware software can detect if there is malware on the computer
What does Unicast Reverse Path Forwarding do and what are the modes?
It protects against spoofing attacks by ensuring the router confirms the address to which a packet is being forwarded is reachable.
Loose - The address of the packet must appear in the routing table
Strict - The packet must originate on the same interface that the router would use for the return
What is a bastion host?
A system that is hardened to resist attacks
What is war driving?
A method of discovering 802.11 wireless networks by driving around with a laptop and looking for open wireless networks.
List the common criteria (CC) seven levels
EAL1 - Functionally tested
EAL2 - Structurally tested
EAL3 - Methodically tested and checked
EAL4 - Methodically designed, tested and reviewed
EAL5 - Semi-formally designed and tested
EAL6 - Semi-formally verified design and is tested
EAL7 - Formally verified design and is tested
What is “flaw hypothesis methodology” used for?
Used to analyze OS vulnerabilities in a penetration testing project