Chapter 1 - Networking Security Concepts Flashcards

0
Q

Network security objectives involve what 3 basic concepts?

A

Confidentiality, integrity, and availability. CIA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
1
Q

When it comes to users, what is a key part of a comprehensive security policy?

A

Training users and remembering that users themselves represent a security risk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are 2 types of data?

A

1) Data in motion as it moves across the network

2) Data at rest, when data is sitting on storage media

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does confidentiality mean?

A

Only the authorized persons or systems can view sensitive or classified information. It also implies that unauthorized individuals should not have any type of access to the data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the primary way to protect data in motion?

A

Encrypting the data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does integrity mean?

A

Changes made to the data are only done by authorized individuals or systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is corruption of data?

A

Failure to maintain data integrity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is availability?

A

Applies to system and data - if a system is not available to end users this may have a significant impact on a business whose users rely on it. This can equate to loss of revenue.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is risk management?

A

Based on specific principles and concepts related to both asset protection and security management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is an asset?

A

An item that is to be protected. It can include property, people, and information. Also, intangible items such as proprietary info or trade secrets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a vulnerability?

A

An exploitable weakness of some type. This can be from a malicious attack or accidentally triggered by because of a failure or weakness in the policy, implementation, or software running on the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a threat?

A

This is what you are protecting against. It’s anything that attempts to to gain unauthorized access to, compromise, destroy, or damage an asset.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Why must you be ever diligent to keep up with threats?

A

Threats can morph and be modified over time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is risk?

A

The potential for unauthorized access to, compromise, destruction, or damage to an asset.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How do you reduce the potential for a threat to be successful and reduce overall risk?

A

Ensuring that proper countermeasures and protections are in place.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a countermeasure?

A

A device or process (a safeguard) that is implemented to counteract a potential threat, which thus reduces risk.

16
Q

What are 4 asset classification categories?

A

1) Governmental classifications (Unclassified, Sensitive but unclassified (SBU), Confidential, Secret, Top Secret)
2) Private sector classifications (Public, Sensitive, Private, Confidential)
3) Classification criteria (Value, Age, Replacement cost, Useful lifetime)
4) Classification roles (Owner [the group ultimately responsible for the data], Custodian [the group responsible for implementing the policy as dictated by the owner], and User [those who access the data and abide by the rules of the acceptable use for the data]

17
Q

What are 3 common methods used to implement countermeasures?

A

1) Administrative - Written policies, procedures, guidelines, and standards.
2) Physical - Physical security for the network servers, equipment, and infrastructure.
3) Logical - Logical controls include passwords, firewalls, IPS’s, access lists, VPNs, etc.

17
Q

Describe a man-in-the-middle attack at Layer 2.

A

The attacker spoofs Layer 2 MAC addresses to make the devices on the LAN believe that the Layer 2 address of the attacker is the Layer 2 address of their default gateway. Frames that are supposed to go to their default gateway are now going to the Layer 2 address of the attacker.

17
Q

What is a man-in-the-middle attack?

A

When an attacker places himself in line between 2 devices that are communicating with the intent to perform reconnaissance or to manipulate the data as it moves between them.

18
Q

What are 5 other additional miscellaneous attack methods?

A

1) Covert channel
2) Trust exploitation
3) Password attacks
4) Botnet
5) DoS and DDoS

18
Q

How can a man-in-the-middle attack occur at Layer 3?

A

A rogue router being placed on the network and then tricking the other routers into believing that the new router has a better path. This could cause network traffic to flow through the rogue router and again allow the attacker to steal data.

18
Q

What is a password attack?

A

These could be brute force, where the attacker’s system attempts thousands of possible passwords looking for the right match.

18
Q

What technique could you use to prevent spoofing of Layer 2 addresses?

A

Dynamic Address Resolution Protocol (ARP) Inspection (DAI)

18
Q

What is a covert channel attack?

A

This uses programs or communications in unintended ways. Example, if the security policy says that web traffic is allowed but peer-to-peer messaging is not, users can attempt to tunnel their peer-to-peer traffic inside of HTTP traffic. The attacker tries to hide traffic by tunneling it inside of some other allowed protocol to avoid detection.

18
Q

What is an overt channel?

A

The legitimate use of a protocol, such as a user with a web browser using HTTP to access a web server.

18
Q

What are some ways to mitigate Layer 3 man-in-the-middle attacks?

A

Using routing authentication protocols and filtering information from being learned or advertised on specific interfaces.

18
Q

In regards to management of devices, what is a best practice to avoid the stealing of usernames and passwords during a man-in-the-middle attack?

A

Use management protocols that have encryption built in such as SSH or HTTPS, or VPN.

18
Q

What is trust exploitation?

A

If a firewall has 3 interfaces and the outside interface allows all traffic to the DMZ, an attacker could leverage that by gaining access to the DMZ and using that location to launch his attacks from there to the inside network.

18
Q

How can you implement a security policy that takes nothing for granted?

A

Requiring authentication from users before their computer is allowed on the network.

18
Q

Other than spoofing Layer 2 addresses, how else could an attacker perform a man-in-the-middle attack at Layer 2?

A

By placing a switch on the network and manipulating Spanning Tree Protocol (STP) to become the root switch (and thus gain the ability to see traffic that needs to be sent through the root switch).

19
Q

What is a botnet?

A

A collection of infected computers that are ready to take instructions from the attacker.

21
Q

What are 4 guidelines for a secure network architecture?

A

1) Rule of least privilege
2) Defense in depth
3) Separation of duties
4) Auditing

22
Q

What is the rule of least privilege?

A

This rule states that minimal access is only provided to the required network resources, and not any more than that.

23
Q

What is defense in depth?

A

This concept suggests that you have security implemented on nearly every point of your network. Filtering at the perimeter router, filtering again at a firewall, using IPSs to analyze traffic before it reaches your servers, and using host-based security precautions at the servers, as well.

24
Q

What is separation of duties?

A

By placing specific individuals into specific roles, there can be checks and balances in place regarding the implementation of the security policy.

25
Q

What does auditing refer to?

A

This refers to accounting and keeping records about what is occurring on the network. Most of this can be automated through the features of authentication, authorization, and accounting (AAA).

33
Q

What is DoS and DDoS?

A

Denial-of-service attack and distributed denial-of-service attack. An example is using a botnet to attack a target system.