Ch 6 - Security Technology-Firewalls and VPNs Flashcards
(32 cards)
Story Time
Beg. Chapter
Kelvin Urich - scheduled to present a plan to Charlie Moody and the IT planning staff in 2 weeks on the Internet connection architecture
W/O this they cannot start costing the project or planning for deployment
Laverne Nguyen (architecture team) - No consensus on 2 design alternatives presented by the consultant:
- Screened subnet with bastion hosts
- Screened subnet with proxy servers
Miller Harrison (contractor brought in to help with the project) - seems to be in disagreement and pouting.
Ends with Kelvin calling for a meeting the next day with the consultant to make the decision
Learning Objectives
- Recognize the important role of access control in computerized information systems, and identify and discuss commonly used authentication factors
- Describe firewall technology and the various approaches to its implementation
- Identify the various approaches to control remote and dial-up access by means of the authentication and authorization of users
- Discuss content filtering technology
- Describe the technology that enables the use of VPNs (virtual private networks).
Access Control
is the method by which systems determine whether and how to admit a user into a trusted area of the organization.
Restricted areas could be: computer room
How is access control achieved? via a combination of policies, programs, and technologies
ACs can be: mandatory, non-discretionary or discretionary
Mandatory access controls (MACs)
use data classification schemes, giving users and data owners limited controls over access to information resources.
How does a data classification scheme work?
Information is rated by sensitivity and each user is assigned the level of information that they may access
Lattice-based access control
a form of access control where users are assigned a matrix of authorizations for particular areas of access.
It relies on:
Access Control List (ACL) - column of attributes of a particular object (i.e. printer)
Capabilities Table - a row of attributes associated with a particular subject
Nondiscretionary Controls
strictly enforced version of MACs that are managed by a central authority in the organization.
Can be role-based controls or task-based controls
Discretionary access controls (DACs)
implemented at the discretion or option of the data user.
Authentication
process of validating a supplicant’s purported identity
3 Widely used authentication mechanisms/factors:
- Something the supplicant knows
- Something a supplicant has
- Something a supplicant is
Something a supplicant knows?
- password
- passphrase
Something a supplicant has?
- dumb cards - atm
- smart cards
- synchronous tokens
- asynchronous tokens
Something a supplicant is or can produce
- Fingerprints, palm prints, hand topography
- iris scans, voice patterns
- signatures
biometrics
authorization
the matching of an authenticated entity to a list of information assets and corresponding access levels
accountability or auditability
ensures all actions on a system authorized or otherwise can be attributed to an authenticated identity
Firewalls
prevents specific types of information from moving between the outside world, known as the untrusted network, and the inside world, known as the trusted network.
Firewalls can be categorized by:
processing mode,
development,
or structure
Firewall processing mode categories
- Packet-filtering firewalls
- Application gateways
- Circuit gateways
- MAC layer firewalls
- Hybrids-use a combination of the previous 4 - most firewalls fall in this category
Packet-filtering firewalls
Packet-filtering firewalls examine every incoming packet header and can selectively filter packets based on header information such as destination address, source address, packet type, and other key information
Packet-filtering Firewalls Types
- Static
- Dynamic
- Stateful (More thorough, more processing req.)
Application Gateways - application-level firewall - application firewall
is frequently installed on a dedicated computer, separate from the filtering router, but is commonly used in conjunction with a filtering router. The application firewall is also known as a proxy server since it runs special software that acts as a proxy for a service request.
Circuit Gateways Firewall
operates at the transport layer.
Again, connections are authorized based on addresses. Like filtering firewalls, circuit gateway firewalls do not usually look at traffic flowing between one network and another, but they do prevent direct connections between one network and another. They accomplish this by creating tunnels connecting specific processes or systems on each side of the firewall, and then allowing only authorized traffic, such as a specific type of TCP connection for authorized users, in these tunnels.
MAC Layer Firewalls
Thus, MAC layer firewalls link the addresses of specific host computers to ACL entries that identify the specific types of packets that can be sent to each host, and block all other traffic
Firewall processing inspection location

Firewalls by generation
First - Fifth
- static packet-filtering firewalls
- application-level firewalls or proxy servers
- stateful inspection firewalls
- dynamic packet-filtering
- Kernel proxy - a specialized form that works under Windows NT Executive. Evaluates packets at multiple layers of the protocol stack
Firewalls Categorized by Structure
- Commercial-grade firewall applicances
- Commercial-grade firewall systems
- Small office/Home office (SOHO) Firewall appliances
- Residential-Grade Firewall Software