11. Network security: firewalls Flashcards

1
Q

What is a firewall?

A

Controls incoming and outgoing traffic between a trusted internal network and an untrusted external network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are firewall policies?

A

Set of rules a firewall to allow/deny traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are blacklists?

A

Allow by default

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are whitelists?

A

Deny by default

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are stalest packet filters?

A

Permits or deny packets in isolation based on the packets header

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How do stateful firewalls work?

A

Maintains a table of each active connection so it can determine if packets are part of legitimate sessions originating from within the trusted network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a port scan?

A

Attacker scans all ports of an IP, looking for applications listening

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How does a stateful firewall detect port scans?

A

Since it maintains a table of connections it can detect a single IP trying to contact many ports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is an application layer firewall/proxy?

A

Screens information at the application later e.g. blocking web traffic containing certain words and preventing credit card numbers leaving a database

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does NAT stand for?

A

Network address translation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Why do we need NAT

A

Only 4.3 billion IPv4 addresses, so devices need to share

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How does NAT work?

A

Router maps between its own IP and the internal IP’s

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How does rule based intrusion detection work?

A

Identifys actions that match certain known intrusion attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the disadvantages of rule-based intrusion detection? (2)

A

Requires admin to anticipate attack patterns

Impossible to detect new types of attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the advantages of rule based intrusion detection? (2)

A

High accuracy, low false positives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How does statistical intrusion detection work?

A

Build statistical model of acceptable/normal behaviour and flag anything the does not match

17
Q

What are the advantages of statistical intrusion detection? (2)

A

Admin doesn’t need to anticipate potential attacks

Can detect new types of attack

18
Q

What are the disadvantages of statistical intrusion detection? (3)

A

Needs time to warm up to new behaviour

Higher false positives, low accuracy