Chapter 10 Flashcards
Two ways to protect malware (and their advantages and disadvantages):
1) signature-based
Advantage: Accuracy is really high.
Disadvantage: You will miss new attacks, they can easily pass checking.
2) anomaly-based
compares against baseline traffic on network
Advantage: Accomodates new types of attacks
Disadvantage: “operation i usually see is different”
May generate false positive
Where to focus for Network Security (4 points)?
- Protecting networks
- Protecting network traffic
- Mobile device security
- Network security tools
A well-configured and patched network is the _______ of any security program
foundation
What is Network segmentation?
• Divide a network into multiple smaller independent networks, called a subnet
How can we control the flow of traffic between subnets?
o Allowing or disallowing traffic
o Blocking the traffic entirely
We can control traffic flow within the subnet for _______ purposes
troubleshooting
True or False: Traffic monitoring is easier in subnets
True
Why do we funnel Network Traffic through choke points?
to inspect, filter, and control the traffic
What are Choke points?
o Routers that move traffic from one subnet to another
o Firewalls or proxies that control traffic moving within, into, or out of our networks or portions of our networks
o Application proxies that filter the traffic for particular applications such as Web or e-mail traffic
Choke points come with some risk because if they ____ the network is _______
fail
compromised
“Choke points come with some risk because if they fail the network is compromised”
Redundancy helps to…
mitigate risk to our networks
Technical issues or attacks may impact network _______ devices; hence, network operations.
infrastructure
Good network design considers planned ________ for devices failing, connectivity loss etc.
redundancy
Give an example of planning for redundancy:
In the even of a DDoS attack to a border device:
oRedundancy will allow us switch to a different connection to the Internet, or toute traffic through a different device until we solve current issue
What is a firewall?
A mechanism for maintaining control over the traffic that flows into and out of our network
Where should we place firewalls, typically?
- Typically on the border between our internal network and the Internet
- Can also be placed within our network for access control
What should we filter with firewalls?
Based on a variety of factors and largely depends on the complexity of the firewall
• Example: we may allow Web and e-mail traffic to pass, but block everything else
What is Packet Filtering?
- Inspecting contents of each packet individually to make a decision
- Based on the source and destination IP addresses, the port number, and the protocol being used
_____ _______ is one of the oldest and simplest of firewall technologies
Packet Filtering
Which firewall has the disadvantage that “it is possible to slip attacks through this type of firewall as packets are inspected individually”
Packet Filtering
What is the function of a Stateful Firewall?
Same working principle as in packet filtering, but a Stateful Firewall keeps track of the traffic at a granular level
A stateful firewall is able to watch the traffic over a ____ _______.
given connection
The connection state, as monitored by a stateful firewall, is maintained in a ____ ____.
state table
A given connection is defined by:
the source and destination IP addresses, the ports being used, and the already existing network traffic