Network Security Basics Flashcards

1
Q

Known Attack methods (Threats)

A

1 - Known Vulnerabilities not patched.
2 - Network Storms/Floods – DOS, Fuzzing.
3 - Spoofing – Fake Identity, Impersonation.
4 - Man-In-The-Middle.
5 - Replay attacks – Modify packets and send.
6 - Sniffing – taking a copy of data.
7 - Session Hijacking – stealing session token.
8 - Buffer or Stack Overflow – Used for remote code injection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Unidirectional Gateways (Data Diode)?

A

1 - Network device allowing data to travel only in one direction.
2 - Normal flow control SY, SYN-ACK, ACK must be emulated.
3 - Used in defense and Nuclear plants.
4 - Finding way into IACS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Network Security Technologies

A

1 - Network Security Devices.
A) Firewalls.
B) Data Diodes.
2 - Network Architectures.
3 - Intrusion Detection Systems.
A) NIDS
B) HIDS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Types Of IDS

A

1- NIDS
A) Monitors Network traffic
B) Pre-defined rules (signature based)
C) Behaviors (anomaly-based)
D) Passive Sniffing
E) Inline Deployment (bump in the wire)

2 - HIDS
A) Monitors Host
B) Pre-defined rules (signature-based)
C) Behaviors (anomaly-based)
D) Software agent running on host

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is IDS

A

1 - Intrusion Detection System.
2 - Tools to detect attempts to break into or misuse a computer system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Firewall?

A
  • Filters Network Traffic.
  • Available in hardware and software platforms.
  • Different categories:
    A) Packet Filter
    B) Stateful Inspection
    C) Application proxy and Deep Packet Inspection (DPI)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

IDS Issues

A

1 - False Positives
2 - Deployment and Operational Costs
3 - Limited signature for control system protocols
4 - Requires continuous care and feeding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

IPS

A

1 - Intrusion Prevention System.
2 - Blocks malicious activities.
3 - Not generally used in IACS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

IDS/IPS best practices?

A

1 - Distributed deployment - install NIDS at zone entry points.
2 - Enhance IT IDS signatures with SCADA IDS signatures (industrial protocols oriented)
3 - IPS should be implemented with extreme care to avoid inadvertently blocking necessary traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

UTM

A
  • Unified Threat Management
  • Single Appliance, multiple features.
  • Network Firewalling
  • Network Intrusion Prevention
  • Gateway Anti-virus
  • Gateway Anti-spam
  • VPN
  • Content Filtering
  • Load Balancing
  • Data Leak Prevention
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

VPN

A
  • Virtual Private Network
  • Network that uses a public telecommunication infrastructure such as the Internet to provide remote offices or individual users access to their proprietary data.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

VPN Appliance

A

Ideal VPN appliance offers central management and multi-platform functionality and is compatible with all essential network applications and legacy platforms.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

VPN Protocols

A

1 - TLS VPN is a commonly used protocol for managing the security of message transmission via the web browser.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Types of VPN

A

1 - Site-to-Site VPN
2 - Remote Access VPN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Site-to-Site VPN

A

The two endpoints of the VPN are intermediatory devices that pass traffic from a trusted network to another trusted network while relying on the VPN technology to secure the traffic on the untrusted transport network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Remote Access VPN

A

One endpoint is the host computing device, and the other endpoint is an intermediate device that passes traffic from the host to the trusted network behind the security gateway while relying on the VPN technology to secure the traffic on the untrusted network.