Week 2 - Administering Secure Networks Flashcards
What are the three network security strategies?
- Security Through Network Devices
- Security Through Network Technologies
- Security Through Network Design Elements
Add question here about security through network devices because there is a lot!
What are the two technologies in security through network technologies?
- Network Address Translation (NAT)
- Is a technique used to map private IP addresses to public ones, allowing multiple devices within a local network to share a single public IP address for internet communication. It helps conserve IPv4 addresses and is commonly implemented in routers or firewalls to facilitate seamless data transfer between local and external networks. - Network Access Control (NAC)
- Is a security measure that verifies and authorizes devices attempting to connect to a network, ensuring they comply with security policies before granting access. It helps organizations protect their networks from unauthorized access and potential threats by enforcing strict authentication and compliance checks.
What are the advantages and disadvantages of network address translation (NAT)?
Advantages:
- Masks IP addresses
- Enables multiple devices to share a smaller pool of public IP addresses
- Offers flexibility
Disadvantages:
- Resource-intensive
- Communication delays
- Loss of traceability
What are the elements of security through network design elements?
- Demilitarised Zone (DMZ)
- Virtual LANs (VLANs)
- Remote Access
What is a DMZ?
A DMZ (Demilitarized Zone) is a network segment that sits between an organization’s internal network and the external, untrusted network, such as the internet. It’s used to host public-facing services like web servers, providing an additional layer of security by separating them from the internal network and limiting potential exposure to attacks.
What is a virtual LAN (VLANs)
VLANs divide network devices into logical groups, even if they’re connected to different switches, simplifying management and boosting security. They cut down on network congestion and offer isolation for sensitive data, ensuring it’s only shared within the designated VLAN members.
What is remote access?
Remote access refers to tools—hardware and software—that let users connect to their internal network from afar. It lets remote users tap into the network just like local ones, usually via VPN or dial-up, offering the same interface and functionality
What are network administration principles?
Network administration follows a rule-based approach, guided by both external laws and internal policies. These rules cover:
- device security
- log monitoring
- network design
- port security
In regards to device security, what is a flood guard?
Flood Guard is a device security feature that manages tolerance for unanswered service requests, preventing DoS attacks. Network administrators set a maximum number of concurrent connections. It’s commonly found on firewalls, IDSs, and IPSs.
What are monitoring and analysing logs?
Monitoring and Analyzing Logs:
Logs: Records of events happening in a system.
Security logs: Reveal types of attacks, including successful ones.
Access logs: Detail file requests on a system.
Audit logs: Record user actions.
Event logs: Capture both failed and notable successful events.
Most network devices can capture log data
Why should a centralised log analyser be used?
Challenges in log management: multiple devices, large data volumes, different formats. Solution: centralized log analyser. Logs record events; security logs reveal attacks, access logs detail file requests, audit logs record user actions, and event logs document both failed and significant successful events.
What are the three network design management principles?
Network Design Management Principles:
1. Network Separation
2. Loop Protection
3. VLAN management
What is network separation?
Network Separation is dividing secure and insecure network sections by physically connecting users to different switches and routers, preventing bridging and unauthorized connections from reconfigured devices.
What are the general principles for managing VLANs?
General principles for managing VLANs:
- Set unused switch ports to connect to an empty VLAN.
- Rename default VLANs.
- Ensure public devices aren’t on private VLANs, restricting user access accordingly.