Week 12 - Firewalls, Honeypots, IDS & IPS Flashcards

1
Q

What is a Firewall?

A

First line of defense against attacks
* Protects internal network users from external threats
* Composed of software, hardware and both
* Resides between two or more networks
* Controls the traffic between networks: block or allow traffic access
* Helps prevent unauthorized access
* Types: Host-based and network-based
* Popular: Palo Alto, Juniper, CISCO

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Firewalls benefits

A

Defines a single choke point
* Provides a location for monitoring security events
* Can serve as platform for VPN end point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Firewalls cons

A

Attacks at the application layer may sneak through
* May not protect fully against internal threats
* Improperly secured wireless LAN can be accessed from outside the organization
* Laptop, phone, or USB drive may be infected outside the corporate network then
used internally

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Firewall operations

A

List of Firewall rules is called Access Control List
* Rules can allow/block traffic based on:
* Source IP address
* Destination IP address
* Source Port
* Destination Port
* Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Firewall types

A
  • Packet Filtering accepts/rejects packets based on protocol headers
  • Application Proxy relay for application traffic
  • Circuit-level Proxy relay for transport connections
  • Stateful Packet Inspection adds state information on what happened previously to packet filtering firewall
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Packet filtering Firewalls advantages

A

Simplicity
Transparent to users
Very fast

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Packet filtering Firewalls advantages

A

Simplicity
Transparent to users
Very fast

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Packet filtering firewall disadvantages

A

Limited logging functionality

Does not support advanced user authentication

Vulnerable to attacks on TCP/IP protocol bugs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Where are firewalls located?

A

Can be located on hosts: end users computers and servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly