Module 2 - 03-2 Flashcards
System identification
Define Firewall
A network security device that monitors traffic to and from your network.
It either allows traffic or it blocks it based on a defined set of security rules. A firewall can use port filtering, which blocks or allows certain port numbers to limit unwanted communication.
Define Port Filtering
A firewall function that blocks or allows certain port numbers to limit unwanted communication
What are a few different kinds of Firewalls?
- Hardware firewall
- Software firewall (NVA)
- Cloud-based firewall
Describe a Hardware firewall
A hardware firewall is considered the most basic way to defend against threats to a network. A hardware firewall inspects each data packet before it’s allowed to enter the network.
Describe a Software firewall
A software firewall performs the same functions as a hardware firewall, but it’s not a physical device. Instead, it’s a software program installed on a computer or on a server. If the software firewall is installed on a computer, it will analyze all the traffic received by that computer. If the software firewall is installed on a server, it will protect all the devices connected to the server. A software firewall typically costs less than purchasing a separate physical device, and it doesn’t take up any extra space. But because it is a software program, it will add some processing burden to the individual devices.
What does NVA stand for?
Network Virtual Appliances (NVA)
Describe a Cloud-based firewall
Organizations may choose to use a cloud-based firewall. Cloud service providers offer firewalls as a service, or FaaS, for organizations. Cloud-based firewalls are Software firewalls hosted by a cloud service provider. Organizations can configure the firewall rules on the cloud service provider’s interface, and the firewall will perform security operations on all incoming traffic before it reaches the organization’s onsite network. Cloud-based firewalls also protect any assets or processes that an organization might be using in the cloud.
What are the two main categories of firewalls?
- Stateful
- Stateless
Define Stateful
A class of firewall that keeps track of information passing through it and proactively filters out threats.
Define Stateless
A class of firewall that operates based on predefined rules and does not keep track of information from data packets.
Describe a Stateful Firewall
A stateful firewall analyzes network traffic for characteristics and behavior that appear suspicious and stops them from entering the network.
Unlike stateless firewalls, which require rules to be configured in two directions, a stateful firewall only requires a rule in one direction. This is because it uses a “state table” to track connections, so it can match return traffic to an existing session
Describe a Stateless Firewall
A stateless firewall only acts according to preconfigured rules set by the firewall administrator. The rules programmed by the firewall administrator tell the device what to accept and what to reject. A stateless firewall doesn’t store analyzed information. It also doesn’t discover suspicious trends like a stateful firewall does. For this reason, stateless firewalls are considered less secure than stateful firewalls.
What does NGFW stand for?
Next Generation FireWall
Describe an NGFW
A next generation firewall, or NGFW, provides even more security than a stateful firewall. Not only does an NGFW provide stateful inspection of incoming and outgoing traffic, but it also performs more in-depth security functions like deep packet inspection and intrusion protection. Some NGFWs connect to cloud-based threat intelligence services so they can quickly update to protect against emerging cyber threats.
NGFWs can inspect traffic at the application layer of the TCP/IP model and are typically application aware. Unlike traditional firewalls that block traffic based on IP address and ports, NGFWs rules can be configured to block or allow traffic based on the application. Some NGFWs have additional features like Malware Sandboxing, Network Anti-Virus, and URL and DNS Filtering.
What are benefits of next generation firewall (NGFW)
- Deep packet inspection
(a kind of packet sniffing that examines data packets and takes actions if threats exist) - Intrusion protection
- Threat intelligence
Which class of firewall operates based on predefined rules and does not keep track of information from data packets?
- Stateful
- Stateless
- Cloud-based
- NGFW
Stateless
Stateless firewalls are a class of firewall that operates based on predefined rules and does not keep track of information from data packets.
What does VPN stand for?
Virtual Private Network
Define VPN
A network security service that changes your public IP address and hides your virtual location so that you can keep your data private when you’re using a public network like the internet
Describe a VPN
VPNs also encrypt your data as it travels across the internet to preserve confidentiality. A VPN service performs encapsulation on your data in transit.
Encapsulation is a process performed by a VPN service that protects your data by wrapping sensitive data in other data packets.
The MAC and IP address of the destination device is contained in the header and footer of a data packet. This is a security threat because it shows the IP and virtual location of your private network. You could secure a data packet by encrypting it to make sure your information can’t be deciphered, but then network routers won’t be able to read the IP and MAC address to know where to send it to. This means you won’t be able to connect to the internet site or the service that you want. Encapsulation solves this problem while still maintaining your privacy.
VPN services encrypt your data packets and encapsulate them in other data packets that the routers can read. This allows your network requests to reach their destination, but still encrypts your personal data so it’s unreadable while in transit. A VPN also uses an encrypted tunnel between your device and the VPN server. The encryption is unhackable without a cryptographic key, so no one can access your data.
VPN services are simple and offer significant protection while you’re on the internet. With a VPN, you have the added assurance that your data is encrypted, and your IP address and virtual location are unreadable to malicious actors.
Please note that most websites today use HTTPS. This encrypts the data being transferred between your device and the website. This makes it harder to intercept personal information even if internet traffic can be seen. A VPN encrypts all your internet traffic which helps protect your privacy.
Enterprises and other organizations use VPNs to help protect communications from users’ devices to corporate resources. Some of these resources include servers or virtual machines that host business applications.
Individuals also use VPNs to increase personal privacy. VPNs protect user privacy by concealing personal information, including IP addresses, from external servers.
A reputable VPN also minimizes its own access to user internet activity by using strong encryption and other security measures. Organizations are increasingly using a combination of VPN and SD-WAN capabilities to secure their networks.
VPNs provide a server that acts as a gateway between a computer and the internet. This server creates a path similar to a virtual tunnel that hides the computer’s IP address and encrypts the data in transit to the internet. The main purpose of a VPN is to create a secure connection between a computer and a network. Additionally, a VPN allows trusted connections to be established on non-trusted networks. VPN protocols determine how the secure network tunnel is formed. Different VPN providers provide different VPN protocols.
What does SD-WAN stand for?
Software-defined wide area network (SD-WAN)
Define SD-WAN
A virtual WAN service that allows organizations to securely connect users to applications across multiple locations and over large geographical distances
Define Encapsulation
A process performed by a VPN service that protects your data by wrapping sensitive data in other data packets.
____ is a process performed by a VPN service that protects data in transit by wrapping sensitive data in other data packets.
- HTTPS
- Encapsulation
- NGFW
- Address Resolution Protocol (ARP)
Encapsulation
A VPN service performs encapsulation to protect data in transit. Encapsulation protects data by wrapping it in other data packets.
Define Security zone
A segment of a network that protects the internal network from the internet