Cyber (Allot) Flashcards
(37 cards)
What is a Network Firewall?
Is a system that can monitor and manage access from and to a network
Types of firewall
- On-premise
- Cloud-based…easier to cover SIM-based devices connected outside offices
How does Allot provide the firewall?
From the network (cloud-based), combined or not with threat and content filtering functionality
Why is Allot providing network based firewall?
Increasing demand in SMB space…
- Simplicity (for SMB through CSP)
- Cost (on-premise ca.100€/month CS 10€/month network based )
- Proliferation of IoT devices
- Capex va SaaS model
- Enhanced security and control (on top of threat and content management)
- Strong differentiator…DNS can’t provide and Firewall vendors can’t scale with cost efficiency and simplicity
What are the main SMB FW use cases?
- Visibility…understanding what is happening in your NW, assisting with rule creation
- Prevent inbound connections
- Prevent unauthorized email communication
- Prevent data leakage
- Prevent use of VPNs
- Deny at the end…supporting a zero-trust approach, deny unknown traffic
How many protocols does Allot FW support right now?
30 with the option to define port-based TCP and UDP entries
What does it mean zero-trust approach
Do not trust by default the unknown traffic
Main differences between TCP and UDP?
TCP (Transmission Control Protocol) and UDP (User Datagram Protocol) are both transport layer protocols used for communication over networks.
TCP provides a reliable, connection-oriented communication, ensuring data integrity and delivery. It establishes a connection, handles data sequencing, and acknowledges received packets.
UDP, on the other hand, is a connectionless protocol that doesn’t guarantee delivery or order of packets. It’s often used for real-time applications like video streaming or online gaming, where speed is crucial, and some data loss is acceptable.
In summary, TCP is reliable and connection-oriented, while UDP is faster but provides less reliability and no connection setup.
What is the SMB size Allot’s FW covers?
Up to 50 employees
HTTP va HTTPS vs QUIC?
HTTP (Hypertext Transfer Protocol), HTTPS (Hypertext Transfer Protocol Secure), and QUIC (Quick UDP Internet Connections) are all network protocols used for communication, but they have distinct characteristics:
-
HTTP (Hypertext Transfer Protocol):
- It is the foundation of data communication on the World Wide Web.
- Operates over a reliable transport layer (usually TCP).
- Data is sent in plain text, making it susceptible to interception and tampering.
-
HTTPS (Hypertext Transfer Protocol Secure):
- It’s the secure version of HTTP.
- Uses encryption, usually provided by TLS/SSL, to secure data transmission.
- Uses port 443 for communication.
- Protects against eavesdropping and tampering, ensuring a more secure connection.
-
QUIC (Quick UDP Internet Connections):
- Developed by Google, QUIC is a transport layer protocol.
- It operates over UDP (User Datagram Protocol) instead of TCP, reducing latency.
- Combines features of both TCP and UDP, providing reliability like TCP and speed like UDP.
- Aims to improve web page loading times and overall performance.
In summary, HTTP is the standard protocol for web communication, HTTPS adds a layer of security with encryption, and QUIC is a newer protocol designed for improved speed and performance by utilizing UDP.
TRUE air FALSE
HS supports IPv6 only on control plane, not in user plane
FALSE, it does support both
How many routers does HS platform support?
10million, 5 for threat management and 5 for analytics
What is HS accuracy in device identification?
95%
What does smart filtering on router consists on?
Downloading a whitelist the the router . An algorithm optimized RAM consumption at router and another one at backend controls the white lost to be updated? This allows 95%+ of the DNS consultations to skip backend , while the remaining it does but in paralélele to DNS so latency is minimum
Which type of infra does Allot backend supports?
On premises, public and private cloud
What is the selective steering for antivirus scanning at HS/BS?
Unique feature, steers traffic from router for antivirus scanning. Only unencrypted traffic suspicious of containing viruses
What are the main differences between HS and BS?
- BS support multiple routers per account (branches or locations)
- BS supports multiple groups and instances and device assignation
- BS does not have parental control but content control
What are the key attributes of Allot’s device identification?
Active scanning of devices for additional attributes - SNMP, Bonjour, UPnP
Cost optimization and caching
Active scanning protocols supported by Allot HS/BS:
Active scanning of devices for additional attributes involves actively searching for information about devices on a network. SNMP (Simple Network Management Protocol), Bonjour, and UPnP (Universal Plug and Play) are protocols used for this purpose.
- SNMP (Simple Network Management Protocol): It enables the monitoring and management of network devices. Active scanning using SNMP involves querying devices for information like system status, network performance, and other relevant details.
- Bonjour: This is an Apple protocol that helps devices discover and connect to each other on a local network. Active scanning with Bonjour involves identifying devices and services available in the network.
- UPnP (Universal Plug and Play): It’s a set of networking protocols that allows devices to discover each other’s presence on a network. Active scanning using UPnP involves identifying and interacting with devices that support this protocol.
In simple terms, active scanning with these protocols means actively looking for and collecting information about devices on a network to better understand their capabilities and status.
What are the 3 pillars of Allot GDPR compliancy?
- Privacy by design and data encryption
- Right of access/ end users
- Right to be forgotten/ for EMD users
What is smishing?
the fraudulent practice of sending text messages purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords or credit card numbers.
What is a vishing attack or TOAD?
type of scam in which criminals contact a potential victim over the phone pretending to be a company and try to convince them to share personal information.
TOAD = telephone-oriented attack delivery
What is a BEC attack?
A Business Email Compromise attack
What is SASE?
Certainly! SASE stands for “Secure Access Service Edge.” In simple terms, it’s a cybersecurity approach that combines network security with internet security. SASE aims to provide secure access to applications and data for users, regardless of their location.
Think of it like a virtual security perimeter that follows you wherever you go, ensuring that your connection to applications and data is always safe, whether you’re in the office, at home, or on the go.