Sec+ Chapter 12: Network Security Flashcards
(106 cards)
Defense in depth
Medieval army attacking a castle analogy
Security principle that says environments must be built around multiple controls to ensure that one failure in a single control, or multiple controls, won’t cause a security breach
OSI Model
Open systems interconnection model
From the bottom-up
1) Physical
2) Data
3) Network
4) Transport
5) Session
6) Presentation
7) Application
Network segmentation
The act of dividing up a network into logical, virtual, or physical groupings
VLAN
Virtual LAN
A broadcast domain that’s segmented at OSI layer 2 (data)
Switches and other devices are used to create VLANs
DMZ
Demilitarized zone / screened subnet
Network zones containing systems that are exposed to less trusted areas
Commonly used to contain web services or other internet-facing devices
Intranet
Internal network protected from external access
Employees only for internal or VPN access only
Extranet
Network set up for external access, usually by partners or customers rather than the public at large
Unlike a DMZ, this usually requires additional authentication to gain access
Zero trust
A concept that says nobody should be trusted, regardless of if they’re an internal or external person or system
Zero trust network
A network that includes security between systems as well as at security boundaries
NAC
Network access control / network admissions control
NAC validates security status for systems and allows or disallows connection to a network
Rules for access can be based on user, group, location, application, etc
Agent based NAC
Requires installation and adds complexity and maintenance
Provides greater insight and control
Agentless NAC
Lightweight installs, easier to handle for machines that aren’t centrally managed or have devices that don’t support NAC agent
Provides less detail and can’t be scheduled
Port security
Limiting the number of MACs that can be used on a single port
Prevents MAC spoofing, content addressable memory (CAM) table overflows, and extending network through additional devices
CAM table
Content addressable memory table
Maps MAC addresses to IP addresses which allows switches to send traffic to the correct port
CAM table attack vector
Attackers who can fill CAM tables can make switches fail over to broadcasting traffic, making otherwise inaccessible traffic visible on their local port
Effectively turns the switch into a hub without any intelligence for where frames should be sent
All frames are sent to all interfaces on the switch
Loop protection
Detecting loops and disabling ports to prevent loops from causing issues
STP
Spanning tree protocol
A common way to implement loop control on layer 2 networks
STP is also great at finding problems in a network
EX: An outage occurs, and you lose connectivity on a network path
STP constantly monitors itself and can go into convergence mode to examine what interfaces are available based on an outage
It can work around the problem, maintain comms on the network, and still prevent loops
Broadcast storm control
AKA Storm control
Prevents broadcast packets from being amplified as they traverse a network
Occurs when a loop in a network causes traffic amplification as switches attempt to figure out where traffic should be sent
Limit the number of broadcasts per second, control multicast or unicast, or manage the change over normal traffic patterns
BPDU guard
Bridge protocol data unit guard
STP takes 20-30 sec before it understands what path to use when a new device is connected to the network
It has to perform the same checks every time we plug in
Instead of the delay, we can configure the switch to let it know the only thing plugging in is an end station
Bypass the STP listening and learning, plug device in and instantly start communicating on the network
The issue is someone could plug in with another switch, and there would be a loop over that connection
To get the speed with port fast and security of STP, configure BPDU guard on the switch
BPDU is the primary protocol used by STP
Switch will constantly watch comms coming from interfaces, and if an interface ever sends a BPDU frame it recognizes a switch could be on the other side of comm
Port fast is then disabled before a loop can occur
DHCP snooping
Someone can plug in a DHCP server not authorized to be on the network, which creates DoS or security issue
Switches have software that look for these problems though called DHCP snooping
Switch is configured with a list of trusted interfaces, but also other untrusted interfaces
Switch watches for DHCP conversations, and if it appears from an untrusted interface, the switch filters out the conversation and disallows it from being sent
SPAN
Switched port analyzer
Does the same as port mirror, but can combine traffic from multiple ports to a single port for analysis
Port mirror
Sends a copy of all traffic sent to one switch port to another switch port for monitoring
VPN
Virtual private network
Creates a virtual network link across a public network that allows endpoints to act as if they’re on the same network
Encryption is not a requirement, but often used in the tunnel
IPSec VPN
Internet protocol security VPN
Allows authentication and encryption over a layer 3 network, and also supports packet signing along with encryption
This allows for secure data, but anti replay built into the conversation
Two core IPSec protocols:
1) AH (authentication header): No encryption, hash of the packet and a shared key, adds AH to the packet header
Provides data integrity with hash
Guarantee origin of data with authentication key
Prevents replay attacks with sequence numbers
2) ESP (encapsulation security payload): Encryption with AES, hash with SHA 256, and authenticates
In most implementations, this will be combined with AH to make sure the data gets through the network without alteration
Two modes:
1) Tunnel mode: entire packet sent is protected
2) Transport mode: IP header not protected, but IP payload is