3.0 - Implementation Flashcards
(149 cards)
Define
SRTP
• Secure Real-Time Transport Protocol
• Adds security features to RTP
• Integrity, replay protection, and AES encryption
• Used for voice and video
Define
NTPsec
• Secure Network Time Protocol
• Began development in 2015
• Adds security to NTP and cleans up code base
• (NTP has commonly been used as amplifiers in DDoS attacks)
Define
S/MIME
• Secure/Multipurpose Internet Mail Extensions
• Public key encryption and digital signing of mail content
• Requires PKI or similar organization of keys
Define
IPsec
• Internet Protocol Security
• Allows sending of data over OSI layer 3 with authentication and encryption for every packet
• Very standardized, common to use across multiple vendors
• Its two primary protocols are AH and ESP
Explain
AH
• Application Header
• One of the core protocols of IPsec
• Adds a hash of the IP packet and a shared key
• The hash adds integrity
• The shared key authenticates the origin
• Also includes sequence numbers, to prevents replay attacks
• Does not encrypt data, only provides integrity
• Can be used independently, but is most often used with ESP
Define
ESP
• Encapsulation Security Payload
• One of the core protocols of IPsec
• Adds encryption to IP packets
Difference between FTPS and SFTP?
• FTPS is “FTP over SSL”
• SFTP is “SSH FTP”
Define
LDAPS
• LDAP Secure
• A non-standard implementation of LDAP over SSL
Define
SASL
• Simple Authentication and Security Layer
• Directory service to provide authentication using many different methods
• Such as Kerberos or client certificate
• Can be used by LDAP
Define
DNSSEC
• Domain Name System Security Extensions
• Validates DNS responses to authenticate the origin and confirm the data integrity
• Uses public key cryptography
Define
SNMPv3
• The secure version of SNMP
• Adds authentication, integrity, and confidentiality through encryption
How can security be added to DHCP?
• It does not include any security functions in its original specification
• Switches can be configured to only allow DHCP responses to come from specified trusted interfaces
• In Active Directory, DHCP servers must be authorized
Define
DHCP Snooping
• The term used by Cisco for the feature of specifying what interfaces on a switch are allowed to send DHCP responses
• Filters invalid IP and DHCP information
Explain
EDR
• Endpoint Detection and Response
• A newer method of threat protection, rather than signature-based
• Detects threats through behavior analysis, machine learning, process monitoring
• Can run through a lightweight agent on an endpoint
• Both investigates threats and can respond to it
• Reponses may include isolating the system, quarantining the threat, rolling back to a previous config
• Can be automated and API-driven
What are alternative terms for NGFW?
• Application Layer Gateway
• Stateful Multilayer Inspection
• Deep Packet Inspection
Define
NGFW
• Next-Generation Firewall
• Inspects the application layer, all data in every packet, rather than just looking at IP address and port number
• Can allow or block application features
• Identify attacks and malware
• Examine encrypted data (if configured to manage the keys)
• Prevent access to URLs or URL categories
Define
HIDS and HIPS
• Host-Based Intrusion Detection System
and
• Host-Based Intrusion Prevention System
• Runs directly on an endpoint/host, and looks through log files to identify intrusions
Explain
TPM
• Trusted Platform Module
• Hardware installed to assist with cryptography and device security
• Cryptographic processor and key generator
• Comes with unique keys burned in during production
• Can store keys, hardware configuration info, etc.
• Password protected with anti-brute force features
How does UEFI BIOS protect against malicious firmware updates?
• BIOS includes the manufacturer’s public key
• When flashing a BIOS update, the firmware’s digital signature is checked against that key
• BIOS will prevent unauthorized writes to the flash
Define
Secure Boot
• Part of the UEFI specification
• When enabled, Secure Boot verifies the bootloader
• Checks the bootloader’s digital signature
• Bootloader must be signed with a trusted certificate, or else its signature must be manually approved
• Confirms that no part of that bootloader has been changed
Define
Trusted Boot
• The bootloader verifies the digital signature of the OS kernel
• The boot process will halt if a corrupted kernel is detected
• The kernel then verifies all other startup components, including boot drivers and startup files
• ELAM then runs prior to loading all remaining drivers.
Define
ELAM
• Early Launch Anti-Malware
• A security feature of Windows that checks every driver to see if it is trusted prior to loading it
• Runs early in the boot process
• Checks digital signatures, and prevents untrusted drivers from loading.
Explain
Measured Boot
• UEFI stores a hash of firmware, boot drivers, and everything else loaded during Secure Boot and Trusted Boot processes
• This hash is stored in the TPM and can be sent, encrypted and signed by the TPM, to a verification server
Define
Remote Attestation / Boot Attestation
• When the Measured Boot process completes, the TPM encrypts, signs, and sends an operational report to a verification server
• The attestation server receives the boot report, and compares it to the known-trusted configuration of the system
• If changes are found, they are identified and various actions can be taken