Chapter 12 Network Security Flashcards
What is Defense in Depth?
Defense in depth is using multiple layers of security controls to ensure the failure of a single control is unlikely to cause a breach.
What is purpose of the OSI model?
The purpose of the OSI model is to conceptually describe how devices and software operate together through networks
OSI Model Structure
The 7 layers are divided into two groups, the host layers and media layers. Layers 1-3 are the media layers used to transmit bits that make up network traffic. Layers 4-7 are the host layers that ensure data transmission is reliable and manageable.
- Physical Layer
- Data Link Layer
- Network Layer
- Transport Layer
- Session Layer
- Presentation Layer
- Application Layer
What is Network Segmentation?
Network Segmentation is the division of networks into logical or physical groups. The most common concept used for network segmentation is a VLAN. These included DMZs, intranets, and extranets.
What is a DMZ?
a DMZ is a perimeter network that protects and adds an extra layer of security to an organizations internal LAN from untrusted traffic.
Intranet vs. Extranet
Intranet is a network where employees communicate, collaborate, etc. an Extranet is similar but provides controlled access to authorized customers vendors partners or other outsiders.
Ex. Workbench is an intranet, new Intellink is an extranet.
What is the concept of zero trust?
Zero trust is the assumption that threats will come from both inside and out, nobody is trusted regardless of position or location.
What is a NAC?
Network Access Control tech focuses on whether a system or device should be allowed to connect to a network.
What is the difference between agent vs. agentless based NAC?
Agent based NAC requires installation and adds complexity and maintenance but provides more control.
Agentless based NAC installations are lightweight and easier to handle for users whose machines may not be centrally managed, but it provides less detail.
What is Port Security?
Port Security allows you to limit the number of MAC addresses that can be used on a single port.
What are CAM tables and what do they do?
Content Addressable Memory tables map MAC addresses to IP addresses allowing a switch to send traffic to the correct port.
What is a CAM table overflow?
CAM table overflows
If the CAM table doesn’t have an entry, the switch will attempt to determine what port the address is on, broadcasting traffic to all ports if necessary. Attackers who can fill a CAM table can make switches fail over to broadcasting traffic making otherwise inaccessible traffic visible on their local port.
What is the job of a switch?
Switches take information that comes from one port and pass it along to another port.
What is a MAC address
A MAC address is essentially the physical equivalent of an IP address. Every network enabled device has a network adapter (NIC), and the MAC address is that devices unique hardwired address.
What is the best way to prevent CAM overflow attack?
- turn the fucking switch off
2. Port Security (limit the amount of MAC addresses each port can have)
What is a CAM table overflow attack?
CAM table overflow attack is when a flood of bogus MAC addresses is sent to the switch. The flood causes the switch to dump the valid addresses it has into it CAM database tables in attempt to make room for bogus info. After that happens, the switch’s default behavior is to broadcast private messages to all ports.
What is Loop Prevention?
Loop Prevention focuses on detecting loops and then disabling ports to prevent the loops from causing issues.
STP is a layer 2 network protocol used to prevent looping within a network.
What is a broadcast storm?
Broadcast storm occurs when a loop in a network causes traffic amplification to occur as switches try to figure out where traffic should be sent.
How to prevent broadcast storm?
storm prevention prevents broadcast packets from being amplified, which goes hand in hand with loop prevention. enable STP on switches and rate-limit broadcast traffic.
What is BPDU
Bridge Protocol Data Unit is a data message transmitted across a LAN to detect loops in the network.
What is BPDU Guard?
BPDU Guard protects STP by preventing ports that should not send BPDU messages from sending them.
What is DHCP Snooping?
DHCP snooping is a layer 2 security technology that drops DHCP traffic determined to be unacceptable. DHCP Snooping prevents unauthorized (rogue) DHCP servers from handing out IP addresses to clients. It can be configured to drop messages where the source MAC and the hardware MAC of a network card do not match.
DHCP Snooping occurs on SWITCHES!!!
What is a port mirror?
A port mirror sends a copy of all traffic sent to one switch port to another switch port for monitoring.
What is a Switch Port Analyzer (SPAN)?
port mirror sends copy of all traffic from one switch port to another switch port for monitoring
A SPAN does the same thing as a port mirror, but a SPAN can also combine traffic from multiple ports to a single port for analysis.