Module 7 Flashcards

(103 cards)

1
Q

Firewalls - Fw

A

filter (permits or denies) traffic based on a set of criteria. Attempts to control in/out traffic with set rules for inbound & outbound connections. Physical hardware firewalls are at the edge of the network. Host-based firewalls are computer-based software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Network Firewall - NF

A

can usually be routers (firewall feature can be enabled) or can also be an in-line filter. Capable of NAT. Dedicated firewalls can provide multiple features such as firewalls, VPN services, anti-malware, & content filters aka Unified Threat Management (UTM).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Stateless Fw

A

employs only ACL 2 control inbound & outbound traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Stateful Fw

A

keeps track of connections & allows return traffic as long as it was generated inside the network 1st.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Deep-Packet Inspection-DPI aka packet sniffer

A

an advanced method of examining and managing network traffic. Inspects in detail the data packets and may take actions such as alerting, blocking, re-routing, or logging it accordingly (network-based anti-malware). AKA Application-Aware firewall (AAF) or Context-Aware firewall (CAF).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Virtual Private Network - VPN

A

provides a private network connection between 2 endpoints.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

VPN concentrator

A

a device dedicated 2 handling large amounts of VPN connections. A firewall can perform as a VPN concentrator.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Point-To-Point Tunneling Protocol (PPTP) -

A

uses PPP 4 authentication & modified GRL 4 tunnel. It is absolute & insecure don’t use it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Generic Routing Encapsulation GRE Tunnel

A

used w/ router to create a generic tunnel & in combination w/ IPSec to create an encrypted VPN tunnel. Used a lot w/ other protocols.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Internet Protocol Security - IPSec

A

provides a method 4 authentication & negotiation of crypto keys. Uses Internet Key Exchange (IKE) to negotiate the key & (ISAKMP) 4 internet key exchange.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

IPsec algorithms

A

Authentication Algorithms: HMAC-MD5, HAMC-SHA-1.

Encryption Algorithms: DES, 3DES, Blowfish, AES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Secure Socket Layer - SSL VPN

A

uses SSL 2 establish VPN connections, 4 hosts, 2 site VPNs a web browser can be used & easier.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Demilitarized Zone (DMZ)

A

is a private network that sits b/w a private LAN & the public internet. Used 2 expose web-server & other services 2 the internet w/o exposing private LAN. If a machine on the DMZ is compromised by an attacker, they won’t have access 2 the private LAN. Done 4 security reasons to not open port 80 inside the LAN.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Honeypot

A

a host that is fully/partially exposed 2 the internet 2 invite attack while monitoring & collecting info.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Honeynet

A

a network replica with live production & has weak security to invite attacks 4 monitoring purposes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Testing Lab

A

important to have a testing environment separate from the production network. Test patches, updates, new/different hardware/software, fix complex problems, & training.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Malware

A

software written specifically 2 harm & infect a host system. Such as viruses, worms, trojans horses, spyware, adware, ransomware, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Compromised System

A

a host, server, network node, or other computing systems that has been infected w/ malware or attacked & exploited. Such compromised systems will give themselves up by generating strange & unexplainable traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Denial of Service - DoS

A

it is a coordinated attack that floods the target w/ traffic. Sometimes done by an attacker, botnet, or zombie computers controlled by one user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Distributed DoS - DDoS

A

the attack occurs when multiple systems flood the bandwidth or resources of a targeted system, usually one or more web servers. Also makes it difficult to distinguish legitimate vs fake traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Smurf Attack

A

flood traffic via a “spoofed ICMP”. The attacker sends an IP-directed broadcast ping 2 a large network with a spoofed (changed) IP source of the target victim then the ICMP replies go to the target causing a DDoS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

VLAN- Hopping

A

a malicious user on 1 VLAN gains access 2 traffic on another VLAN that shouldn’t have access 2. This malicious user either acts as a trunking switch (Sw spoofing) or double tags its frames w/ 2 VLANs. Can also exploit VOICE & Data VLANs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Man-in-the-middle - MITM

A

the attacker causes traffic b/w 2 endpoints to go through the attacker. Allows an attacker to intercept & manipulate the data. Can be done on a local private LAN or public internet. Many different types of MITMs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

ARP Poisoning

A

a malicious user poisons the ARP cache of devices communicating w/ each other so that the L2 frames will be redirected to a machine, (used 2 intercept communication). A type of MITM attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Session Hijacking
a malicious user intercepts the authentication cookies 4 an insecure (HTTP port 80) web session & gains access. Such methods are an attacker being in the same broadcast traffic as target, cross-side scripting, & browser jacking malware. A type of MITM attack.
26
Brute Force Attack
an attacker uses cracking software, dictionary/ other username & password lists w/ hope of getting correct credentials.
27
Social Engineering
an attacker tricks people & uses their trust to gain access to the system & critical or private information such as username, password, account #s, IP @, etc.... Ex Phishing, spear phishing, tailgating, dumpster diving, etc...
28
Vulnerabilities
1. Unnecessary programs & services running on a machine. 2. Open TCP/UDP ports. 3. Old & Unpatched systems. 4. Cleartext credentials & unencrypted channels 5. Unsecure protocols. 6. Radio Frequency Emanations RFE/EMR - use TEMPEST (Telecommunications Electronics Materials Protected from Emanating Spurious Transmissions)
29
Ransomware
the attack uses a form of malware that encrypts all files on the device holding them hostage 4 a ransom. To avoid/prevent have backups, use firewall, anti-malware, & train users.
30
Phishing
attacker uses electronic communication (emails) 2 obtain sensitive info such as username & passwords, bank info, etc. Emails are disguised to look legitimate but are an attempt to click on fake links. Can be identified by misspelled words, strange URLs, & ask for sensitive info.
31
Deauthentication
attacker deauthenticate (logs out) a user. Makes the user reconnect to a fake/evil twin access point (AP). Can sniff see WPA 4 way handshake, hijack wifi connection, & can mount MITM or brute force attack.
32
Insider Threat
a malicious employee/trusted person gaining access to the network to cause harm or steal data. To identify such person be vigilant if they are entering restricted sections, downloading data, & setting IP logic bomb.
33
Logic bomb
a malicious code that sets off a malicious function when certain conditions are met. Such conditions can be set times, a certain action, or a condition is met.
34
Network Access Control - NAC
is the act of keeping unauthorized users and devices out of a private network. Effective NAC restricts access to devices that are authorized (nodes & MAC @) and compliant w/ security policies, meaning they have all the required security patches and anti-intrusion software.
35
Anti-Malware Software
software used to protect/enhance security on an endpoint.
36
Host-based Anti-malware
is an anti-malware installed directly on the computer. Signature must be updated constantly. Large org. require an anti-malware server to track, punch, & manage updates.
37
Cloud-Server Anti-malware
centralized anti-malware services that run on the cloud as software. Inbound & outbound communications requests are examined. Easy to manage & sometimes requires no additional software.
38
Network-Based Anti-malware
runs on firewalls or other nodes that process internet traffic such as proxy servers. All traffic coming through is examined & uses signature to identify malware. No additional software needed.
39
ARP Inspection
w/ dynamic ARP inspection (DAI) turned on, switches can intercepts all ARP requests & replies & determine the validity of the IP-2-MAC binding. Drops invalid & spoofed ARP packets. Prevent some MITM & ARP poisoning/spoofing.
40
DHCP Snooping
identifies trusted DHCP server. Acts like a DHCP firewall b/w server & hosts. Filters all abnormal/invalid DHCP traffic.
41
MAC Address Filtering
switch keeps a list of MAC @/s to permit or deny access.
42
VLANs
allow us to segment the network into small parts & apply security 2 each VLAN separately. We can also permit VLANs to talk to each other & restrict network access w/ VLAN ACLs.
43
Secure Protocols
SSH, SNMPv3, SFTP, HTTPS, & IPSec
44
802.1x/EAP
a protocol used to authenticate a user. A user will be blocked until allowed access.
45
PPP-PAP, CHAP, MS-CHAP
username/password authentication for remote server access & VPN.
46
Kerberos
a centralized authentication system. Used w/ windows domain client authentication and secure any service requests.
47
Single Sign-On - SSO
allows access to multiple systems/apps w/ a single set of credentials. Uses lightweight Directory Access Protocol (LDAP).
48
Multifactor Authentication
aside from entering a username & password, you use a 2nd app/service to authenticate. Such as PIN, biometrics, physical token, & mobile phone.
49
Intrusion Detection System
is a device or software application that detects/monitors a network or systems for malicious activity or policy violations. Sends alerts of any intrusion/attacker. 2 types Host-based IDS (HIDS) & Network-based IDS (NIDS)
50
Intrusion Prevention System
same as an IDS but prevents/blocks any intrusion/attacker.
51
Wireless Acces Point - WAP
an AP that provides connection to the network. In SOHO device is combined (AP, Switch, & Router).
52
Infrastructure Mode
devices communicate through a WAP 2 access main LAN (traditionally Wi-Fi).
53
Ad Hoc Mode
devices connect directly via Wi-Fi w/o using a WAP of any kind.
54
Service Set Identifier (SSID)
is the wireless network name. Basic SSID (single WAP & SSID). Extended SSID multiple WAPs in the same SSID & clients can roam b/w WAPs.
55
Lightweight Access Point Protocol - LWAPP
allows 4 control of multiple WAPs via a centralized wireless controller (WC) server. APs pull config from WC.
56
Control & Provision of WAP - CAPWAP
based on LWAPP + additional security.
57
Frequency bands & channels
Industrial, Scientific Medicals (ISM) bands (2.4 & 5GHz). Frequency channels are 1-14 in US we use 1-11 since channels can overlap for best practice we use 1, 6, & 11.
58
802.11 Standards
wireless standards 802.11 a, b, g 4 (2.4GHz) & 802.11 n, ac (5GHz).
59
Wired vs Wireless
wired is best used especially for important infrastructure devices like servers. Wireless has higher latency & it is 1/2 duplex.
60
Wireless Spectrum Analyzer - Tool
a tool that scans for the following: 1. Broadcasting SSIDs. 2. Channels used. 3. Dead Spots. 4. Interferences ( microwaves, cordless phones, etc.) 5. Software + hardware 6. Frequency Bands 7. Channel Saturation.
61
Wireless Survey Tool
a tool that provides info on: 1. Heatmap. 2. Planning. 3. Verification. 4. Reporting. 5. Can include spectrum analyzer tool.
62
AP Placement
coverage b/w AP's should overlap to provide coverage. Overlap areas should not use same channel/frequency. Remember Honeycomb method.
63
Wired Equivalent Policy - WEP
uses 4 different keys w/ RCS encryption however it has inherent security flaws making it easy to crack.
64
Wi-Fi Protected Access - WPA
uses protocols Temporal Key Integrity Protocol (TKIP & Pre-shared Key (PSK). Can be cracked especially if an 8 character password is used.
65
WPA2
strongest wireless encryption standard. Uses Advanced Encryption Standard (AES) same as WPA but no TKIP.
66
Basic WLAN Threats
are software utilities 2 cracking attacks to WEP, WPA, & WPS. Such as WEP key, WPA PSK, & Wireless Protected Setup (WEP) cracks.
67
Rogue AP
an evil twin AP or an AP not properly configured.
68
Disable SSID Broadcast - Security Measure
prevent SSID from showing but does not prevent the network from being found nothing can.
69
MAC Filtering
create a list of permitted or denied MAC @, manual updates, good for a small # of devices.
70
Client Isolation
modern APs that can create an isolated network b/w host & AP. Public wireless SSID is a single broadcast domain & only connected hosts can see or hear other hosts.
71
Network Authentication
verifies the user’s identification to a network service to which the user tries to gain access. Adds 2 the regular PSK ( 802.1c w/ EAP, RADIUS, LDAP, etc)
72
Unified Communications - UC
are enterprise communication services such as: 1. Voice & Voicemail 2. Video Conferencing 3. Real-Time video/voice 4. Presence 5. Messaging/chat
73
UC components
1. UC Devices (phone) 2. UC Server (phone server) 3. UC gateway (router)
74
Medianet
end-2-end network architecture that is media-ware & delivers the best security, performance, & QoS 4 voice, video, & data.
75
Signaling protocols
Session Initiation Protocol (SIP) sends signal 2 start a phone call & Media Gateway Control Protocol (MGCP) same as SIP bit cisco owned.
76
Real-Time Transport Protocol - RTP
contains voice/video & take it from point A 2 B. Use sPorts 5004 & 5005, Audio (16384-32767), & video (49152 -65535)
77
Codecs
are uadio & video codeds. Audio (G.711 & 729) video (G.263 & 264).
78
Quality of Service - QoS
allows for prioritization of traffic mainly real-time (voice & video traffic). Done during congestion times & uses QoS tags to mark packets or frames 2 classify & apply QoS controls.
79
QoS Tags
Differentiated Service code Pint (DCSP) L3 tagging of packets in 8-bits. Class of Service (CoS) L2 tagging of frames in 13-bits.
80
Traffic Shaping
Qos terminology 4 defining the amount of network bandwidth available 4 different apps & protocols use.
81
Voice over IP - VoIP
is a method and group of technologies for delivering voice communications and multimedia sessions over IP networks.
82
Voice LAN - VLAN
a LAN dedicated for voice aka auxiliary VLAN (AUXVLAN). IP phone tags VLAN onto phone traffic, forwards computer traffic untagged, & uses CDP & LLDP to learn VLAN info from switch.
83
Virtualization
uses a single physical machine hardware 2 run multiple virtual machines (VM) within it.
84
Hypervisor - Type 1
Based metal hypervisor installed on the physical hardware. Such hypervisors are VMWare, VSphere/ESXi, Microsoft HyperV, & Citrix XenServer.
85
Hypervisor - Type 2
hosted hypervisor installed on a host OS. Such hypervisors are VMWare workstation/Fusion, Oracle VirtualBox, & Parallels (Mac).
86
Virtualized Networking
a physical Switch w/ type 1 hypervisor. Has virtual switch, NIC, router, & firewall.
87
Server Virtualization
consolidation of a server into less hardware. A physical 2 virtual migration (P2V).
88
Virtual Desktop Infrastructure - VDI
virtualization of desktop/OS that sit in a data center endpoint as thin clients access their VM via the network. It is easy 2 manage/backup, higher security, saves costs.
89
Data Center (DC) & Cloud
DC allows the ability 2 run more services & software in a smaller footprint. Cloud allows access to services & resources & only pays for what it uses.
90
Infrastructure as a Service - IaaS
a completely hosted infrastructure in the cloud that provides access 2 networking features, computing hardware 4 desktops, storage space, & internet access as a service (pay as you use). IAAS provider takes care of maintenance. Such providers are AWS, Azure, Google, & Rackspace Open cloud.
91
Software as a Service - SaaS
hosted software solutions & services that are normally licensed subscription-based. Some can be free like Gmail money is made through Ads. Ex. Google Apps, Microsoft O365, Dropbox, & Salesforce, etc.
92
Platform as a Service - PaaS
everything needed for setting up web application in the cloud is provided as a hosted service. Allows software companies/developers to build applications w/o having to worry about anything else.
93
Public Cloud
everything needed 2 runs on the network is fully deployed in the cloud over the internet.
94
Private Cloud
an "on presence" cloud where virtualization tech, server & apps are deployed on-premise on DC.
95
Hybrid Cloud
both public & private clouds but only true if both are connected via VPN sharing resources.
96
Community Cloud
entire infrastructure us shared b/w multiple organizations. Can be hosted publicly, privately, & or hybrid. Costs are shared among the community organizations.
97
Network Storage
provides a centralized data repository 4 all computers on a LAN. Has redundancy/ RAID 2 prevent data loss. 2 types of network storage NAS & SAN.
98
Network Attached Storage - NAS
a network storage hardware attached directly 2 the LAN. Used more on small/home networks and cost-effective.
99
Storage Area Network - SAN
provides dedicated high-speed network b/w high-end server architecture & an array of block-level data storage.
100
Internet Small Computer System Interface - iSCSI
an IP-based storage networking standard for linking data storage facilities. Provides block-level access to storage devices by carrying SCSI commands over a TCP/IP network.
101
Fibre Channel
storage network technology that runs as data speed up to 128 Gbps.
102
Fibre Channel over Ethernet - FCoE
a storage network protocol that encapsulates Fibre Channel frames over Ethernet networks. Uses 10Gbps network while preserving network protocol.
103
Jumbo Frames
are Ethernet frames >1500 bytes of payload, the limit set by the IEEE 802.3 standard. Commonly, jumbo frames can carry up to 9000 bytes of payload, but smaller & larger variations exist and some care must be taken using them.