network security and defence Flashcards
(63 cards)
what is a worm
a standalone malicious program that self-replicates throughout the network without needed to attach itself to other files and programs
what do worms mostly target
systems and network resources
what is a virus
a program that attaches itself to other programs or files and requires user interaction to activate and spread
what makes viruses slightly better than worms
spreads slower and relies on human interaction
what do viruses usually target
files and programs
what are 0 day vulnerabilities
undiscovered vulnerabilities in the system
what are firewalls
software or applications at the networks gateway that filters information that is sent and received from outside the network
what do firewalls do
restrict access between protected networks (internal) and others (external e.g. the internet)
protects the internal network from malicious attempts and users trying to use unauthorised internet services
what are the four types of firewalls
packet filtering firewall
stateful inspection firewall
proxy firewall
application layer firewall
what does the packet filtering firewall do
applies rules to incoming packets based on the ip or port number
it can forward or discard the packets
it can be configured to filter packets going both in and out of the network
what does the stateful inspection firewall do
inspects packets and tracks connection states e.g. tcp handshakes
it uses the ongoing record/state table to make a decision
what do we mean by the stateful inspection firewall tracking connection states
it determines if the packet is at the start, a part of , or not qa part of the connection
what does the proxy firewall do
acts as a middleman between the client and server and proxies all the traffic
how does the proxy firewall work
it processes requests by setting up a connection to the request service on behalf of the user
what are two negatives of the proxy firewall
has low performance
may become a bottleneck
what are two benefits of the proxy firewall
provides deep inspection
can filter application layer content
what does the application layer firewall do
designed to protect a website or app by checking application level traffic
can be configured to support only specific apps and features in an app
what is intrusion detection
network security technology that monitors abnormal activities and security threats and issues alarms on time
what is an intrusion detection system (ids)
an app that implements intrusion detection
what are the four roles that the ids carries out
monitoring
detection
alert
logging
how does the ids carry out monitoring
it analyses traffic and system activity in real time
how does the ids carry out detection
via signature, anomaly, and specification based detection
what does signature detection do and what is a drawback of this
identify known attack patterns
since it compares to signatures you must capture attacks first to create the pattern database
what is a negative of signature detection
doesnt detect 0 day attacks