Chapter 4: Communication and Network Security Flashcards
(132 cards)
-mulithomed firewall
Multi-homed firewalls may be used to setup a DMZ with a single firewall. (see next slide)
On any multi-homed machine, IP forwarding should be disabled.*
802.11 wireless protocols
802.11a 54Mbps5Ghz8 channels802.11b11Mbs2.4Ghz (same as other home devices)802.11g54Mbs2.4Ghz802.11i : Wireless with security. First standard to require WPAII802.11n100Mbs2.4Ghz or 5Ghz
802.15
Bluetooth
802.1x and eap
802.1x is a port based network access control and includes
EAP.
- EAP is an auth frameworks that describes many specific auth protocols PORT Based Auth. at Layer 2 for both wired and wireless
ad-hoc and infrastructure wireless
ah-hoc wirles cards to wireless cares infrastrcute is through access points
Application Proxies - Firewallpros & cons?
Like circuit layer proxies, but actually understand the application/protocol they are proxying.This allows for additional security as they can inspect the data for protocol violations or content.AdvantagesApplication proxies understand the protocol, so they can add extra securityCan have advanced logging/auditing and access control featuresEx. Restrict users to only allowed websitesEx. Inspect data for protocol violationsEx. Inspect data for malware (viri etc)DisadvantagesExtra processing requires extra CPU (slower)Proxies ONLY understand the protocols they were written to understand. So you generally have a separate application proxy for EACH protocol you want to proxyexamples: smtp proxies, ftp proxies
ARP
I’m looking for 192.168.1.2’s MAC addressanswer: that’s me at 00:af:14:b3:bc:12
Layer 2 take ip from L3 for the test say layer 2
Map IP address to Mac address via broadcast
it it then added to the ARP cache
arp poisoning: change mac address to bad server…
asymmetric dsl
fast download less upload
autonomous network how many entitites
one
Blue Bugging
More serious
Allows full use of phone
Allows one to make calls
Can eavesdrop on calls
Blue Jacking
sending spam to bluetooth devices
Blue Snarfing
Copies info off remote devices
Bonk
similar to Teardrop manipulates how a pc reassembles a packet and allows of too large a packet
Buffer Overflow
Attacks a specific type of memeory on a system …the buffers best avoided with input validation. too much to handle…
CHAP
does not expose the cleartext password and is not susceptible to replay attacks. CHAP relies on a shared secret: the password. The password is securely created (such as during account enrollment) and stored on the CHAP server. Since both the user and the CHAP server share a secret (the plaintext password), they can use that secret to securely authenticate.
circuit Switching
all data follows same pathPSTNISDNDSLT-carriers
Data Diddling
Altering/Manipulating data, usually before entry
DCE
similar to kerberos developed by Open Group The Distributed Computing Environment (DCE) is a software system developed in the early 1990s by a consortium that included Apollo Computer (later part of Hewlett-Packard), IBM, Digital Equipment Corporation, and others. The DCE supplies a framework and toolkit for developing client/server applications.
DDos
use of Control Machines (Handlers) and Zombies (Bots) many machines making the attack
Dial up protocol
PPP Point to Point Protocol: Provides Layer 2 framing for dial-up. Needs other protocols for securityEncryption: MPPEAuthentication:PAP (Password Authentication Protocol): Clear TextCHAP (Challenge Handshake Authentication Protocol) Client responds to a challenge from the server. The only way the client can answer correctly is if the correct password had been entered.EAP (Extensible Authentication Protocol) Extends capabilities beyond passwords (smart cards, biometrics, token devices, etc)
DMZ
A buffer zone between an unprotected network and a protected network that allows for the monitoring and regulation of traffic between the two.
DNS port
UDP port 53 tcp port 53 large answers ie zone xfer
Dos
Denial of Service - overwhelm a system and disrupt its availability
DSL
layer 1