block 11 part 2 boundary protection Flashcards

1
Q

boundary protection

A

Prevent/Detect unauthorized Access

protects base’s “network perimeter”

allows only authorized personnel access to (C&I) through single logical service delivery point (SDP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what is National Institute of Standards and Technologies (NIST)

A
  • device controls communication at external boundary of system
  • key internal boundaries within system.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what should informations systems do?

A

establish communication path between remote users with firewalls controlling outgoing/incoming network traffic

separate computing systems and network infrastructures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what is a parallel configuration?

A

wide but shallow
many entrances
(ex. mall)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

serial configuration?

A

very narrow but very deep
ex. bank or airport
single entrance (several gateways or checkpoints)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

what does network security policy do?

A
  • controls network traffic, usage, identifies resources, threats
  • defines network use, responsibilities, details action plans for when security policy is violated.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

when you deploy a network security policy it should

A

strategically enforced at defensible boundaries within your network.

strategic boundaries=perimeter networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

To establish a collection of perimeter networks

A

networks of computers and network security mechanisms need to be designated and defined

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what are the three types of perimeters present?

A

-Outermost (Untrusted)

  • Internal (DMZ)
  • Innermost (Trusted)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

what is outermost (untrusted)?

A

identifies separation point between controlled/uncontrolled assets.

  • DOD COM. most insecure/untrusted part of network
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

what is internal (DMZ)?

A
  • located between the
    innermost and outermost networks.

uses intranet firewalls, IAP and filtering routers.

what goes out must come back in

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

what is innermost (trusted)?

A

last line of protection from outside intrusion. contains the computers, servers, routers, and switches

  • protection on devices (OS firewall or access lists on the routers)

contains more layers of security than other layers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

what is POLP?

A

principle of least privilege =
All accounts will only have access to what they need to conduct day-to-day mission requirements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

why do most orgs prefer a single link to connect to the internet?

A

Managing/policing Internet connection becomes much easier this way.

firewall system; restrict access to services and systems, and can be a monitoring station, keeping logs of attempts to access services and systems from off-site.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

what is the most insecure area of a network infrastructure?

A

outermost perimeter

this area is reserved for external routers, public Internet servers, such as HTTP, FTP, and Gopher servers.
easiest area to gain access and therefore, it is the most frequently attacked.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

what is a proxy server?

A

application/device that breaks connection between client and server.

accepts traffic entering/leaving network processes it, and forwards it.

authority to act for someone else.
(HTTP proxy for web,
SMPT used for email)

17
Q

what is a gateway?

A

two (or more) computer networks that have SIMILAR functions but dissimilar implementations.

enables one way or two-way com between networks

provide compatibility by converting transmission speeds, protocols, codes, or security measures

(voice signals into IP packets, signaling, control, and address translation functions)

18
Q

what is a guard (system)?

A

mechanism limiting exchange of information

  • acts as gateway between two information systems operating under different security policies
  • mediate information data transfers
19
Q

what is a firewall?

A

monitors traffic crossing network perimeters

gateway for communication between trusted, untrusted or unknown networks.

most commonly separate internal
(private) and external (public) networks.

20
Q

what is encrypted tunneling?

A

technology enables network to send data via another network’s connections.