Podcast
Questions and Answers
What is one characteristic of cloud computing?
What is one characteristic of cloud computing?
- High costs
- Scalability (correct)
- Inflexibility
- Physical hardware dependency
All firewalls and gateways provide complete protection against intrusions.
All firewalls and gateways provide complete protection against intrusions.
False (B)
What is the primary function of an intrusion detection system?
What is the primary function of an intrusion detection system?
To monitor and identify potential security breaches.
A ______ is used to manage multiple virtual machines on a single physical server.
A ______ is used to manage multiple virtual machines on a single physical server.
Match the following cloud deployment models with their descriptions:
Match the following cloud deployment models with their descriptions:
What is the primary function of a Load Balancer in cloud computing?
What is the primary function of a Load Balancer in cloud computing?
Automated Scaling Listener can help in managing traffic in cloud computing environments.
Automated Scaling Listener can help in managing traffic in cloud computing environments.
What is the purpose of Failover Mechanisms in cloud computing?
What is the purpose of Failover Mechanisms in cloud computing?
Cloud Usage Monitor is used to track ______ in cloud services.
Cloud Usage Monitor is used to track ______ in cloud services.
Match the following security mechanisms with their descriptions:
Match the following security mechanisms with their descriptions:
What does symmetric key cryptography primarily use for encryption and decryption?
What does symmetric key cryptography primarily use for encryption and decryption?
Public key cryptography uses the same key for both encryption and decryption.
Public key cryptography uses the same key for both encryption and decryption.
What is the main purpose of network security?
What is the main purpose of network security?
The _______ algorithm is widely known for its role in secure data transmission using asymmetric key cryptography.
The _______ algorithm is widely known for its role in secure data transmission using asymmetric key cryptography.
Match the following types of encryption with their descriptions:
Match the following types of encryption with their descriptions:
Which protocol is primarily used for sending email?
Which protocol is primarily used for sending email?
Local DNS servers are responsible for caching DNS information.
Local DNS servers are responsible for caching DNS information.
What service do authoritative DNS servers provide?
What service do authoritative DNS servers provide?
The message type used by a manager to request data from an SNMP agent is called a ______.
The message type used by a manager to request data from an SNMP agent is called a ______.
Match the following protocols with their primary functions:
Match the following protocols with their primary functions:
Which component is NOT a part of DNS?
Which component is NOT a part of DNS?
DNS records are only used for email services.
DNS records are only used for email services.
Name a service provided by DNS.
Name a service provided by DNS.
What is the purpose of a Trap message in SNMP?
What is the purpose of a Trap message in SNMP?
InformRequest is used by the manager to inform a remote entity of MIB values accessible to it.
InformRequest is used by the manager to inform a remote entity of MIB values accessible to it.
What is the main function of the Response message in SNMP?
What is the main function of the Response message in SNMP?
The protocol that allows for managing network devices through a set of defined operations is known as ______.
The protocol that allows for managing network devices through a set of defined operations is known as ______.
Match the following SNMP messages with their purposes:
Match the following SNMP messages with their purposes:
Which of the following is not a function of the network layer?
Which of the following is not a function of the network layer?
The IP Datagram format is consistent across different versions of IP.
The IP Datagram format is consistent across different versions of IP.
What does YANG stand for in network management?
What does YANG stand for in network management?
Which of the following is NOT a property of RSA?
Which of the following is NOT a property of RSA?
A cryptographic hash function is designed to be a one-way function.
A cryptographic hash function is designed to be a one-way function.
What does MAC stand for in the context of message authentication?
What does MAC stand for in the context of message authentication?
In the context of TLS, the _______ phase is used to establish a secure connection.
In the context of TLS, the _______ phase is used to establish a secure connection.
Match the following cryptographic functions with their descriptions:
Match the following cryptographic functions with their descriptions:
What is a key feature of Pretty Good Privacy (PGP)?
What is a key feature of Pretty Good Privacy (PGP)?
Transport-layer Security (TLS) ensures confidentiality and integrity of transmitted data.
Transport-layer Security (TLS) ensures confidentiality and integrity of transmitted data.
What is the primary purpose of a Digital Signature?
What is the primary purpose of a Digital Signature?
Flashcards
SNMP GetBulkRequest
SNMP GetBulkRequest
A message sent from a network management system (NMS) to an agent, requesting a large block of data from the agent's MIB.
SNMP InformRequest
SNMP InformRequest
A message sent from one NMS to another NMS, informing the recipient about changes in the MIB of a managed device.
SNMP Trap
SNMP Trap
A message sent from an agent to an NMS, signaling the occurrence of a significant event or an error.
Remote Procedure Call (RPC)
Remote Procedure Call (RPC)
Signup and view all the flashcards
RPC Identifier
RPC Identifier
Signup and view all the flashcards
Network Layer: Data Plane
Network Layer: Data Plane
Signup and view all the flashcards
Network Layer: Control Plane
Network Layer: Control Plane
Signup and view all the flashcards
IP Datagram Format
IP Datagram Format
Signup and view all the flashcards
SMTP
SMTP
Signup and view all the flashcards
POP3
POP3
Signup and view all the flashcards
IMAP
IMAP
Signup and view all the flashcards
DNS (Domain Name System)
DNS (Domain Name System)
Signup and view all the flashcards
Root Name Servers
Root Name Servers
Signup and view all the flashcards
Authoritative Name Server
Authoritative Name Server
Signup and view all the flashcards
DNS Caching
DNS Caching
Signup and view all the flashcards
DNS Records
DNS Records
Signup and view all the flashcards
Load Balancer
Load Balancer
Signup and view all the flashcards
Symmetric Key Cryptography
Symmetric Key Cryptography
Signup and view all the flashcards
Automated Scaling Listener
Automated Scaling Listener
Signup and view all the flashcards
Public Key Cryptography
Public Key Cryptography
Signup and view all the flashcards
RSA Algorithm
RSA Algorithm
Signup and view all the flashcards
Failover Mechanisms
Failover Mechanisms
Signup and view all the flashcards
Container Orchestration
Container Orchestration
Signup and view all the flashcards
Cipher-Block Chaining (CBC)
Cipher-Block Chaining (CBC)
Signup and view all the flashcards
Denial of Service Attack
Denial of Service Attack
Signup and view all the flashcards
What is Network Security?
What is Network Security?
Signup and view all the flashcards
What is Cloud Computing?
What is Cloud Computing?
Signup and view all the flashcards
Cloud Delivery Models
Cloud Delivery Models
Signup and view all the flashcards
Hypervisor
Hypervisor
Signup and view all the flashcards
Containers
Containers
Signup and view all the flashcards
Benefits of Containers
Benefits of Containers
Signup and view all the flashcards
RSA: purpose
RSA: purpose
Signup and view all the flashcards
RSA: key generation
RSA: key generation
Signup and view all the flashcards
Cryptographic Hash Function: purpose
Cryptographic Hash Function: purpose
Signup and view all the flashcards
Message Authentication Code (MAC): purpose
Message Authentication Code (MAC): purpose
Signup and view all the flashcards
MAC: verification
MAC: verification
Signup and view all the flashcards
Digital Signature: purpose
Digital Signature: purpose
Signup and view all the flashcards
Transport Layer Security (TLS): handshake
Transport Layer Security (TLS): handshake
Signup and view all the flashcards
TLS: encryption
TLS: encryption
Signup and view all the flashcards
Study Notes
- Three major components: user agents, mail servers, simple mail transfer protocol (SMTP)
- User Agent (e.g., Outlook, iPhone mail client): composing, editing, reading mail messages; outgoing and incoming messages stored on server
- Mail servers: mailbox contains incoming messages for user; message queue of outgoing mail messages; SMTP protocol between mail servers to send email messages
- SMTP RFC (5321): uses TCP to reliably transfer email from client (mail server) to server, port 25; three phases of transfer (SMTP handshaking, transfer of messages, closure); command/response interaction (like HTTP)
- Scenario example: Alice sends email to Bob (step-by-step process showing message transfer via SMTP)
SMTP: Observations
- Comparison with HTTP: HTTP is client-pull, SMTP is client-push
Mail Message Format
- SMTP: protocol for exchanging email messages (defined in RFC 5321)
- RFC 2822 defines email message syntax (like HTML defines web document syntax)
- Header lines (e.g., To:, From:, Subject:) and email body (ASCII characters only)
Retrieving Email: Mail Access Protocols
- IMAP (Internet Mail Access Protocol, RFC 3501): stores messages on server for retrieval (e.g., Gmail, Hotmail, Yahoo); provides retrieval, deletion, folders
- HTTP (e.g., Gmail, Hotmail, Yahoo!): web-based interfaces on top of SMTP for sending and IMAP for retrieving emails
Domain Name System (DNS)
- Distributed database implemented in a hierarchy of many name servers
- Service that almost all other applications depend upon
- Application-layer protocol: hosts and DNS servers communicate to resolve names
- DNS runs over UDP protocol, using UDP port 53
- Translates host names into host addresses (Name Space)
- DNS services (hostname-to-IP-address translation, host aliasing, mail server aliasing, load distribution)
- DNS structure (DNS services; reasons why DNS can't be centralized)
DNS: services, structure
- Hostname-to-IP-address translation
- Host aliasing
- Mail server aliasing
- Load distribution
- Purpose of DNS (centralized; traffic volume; maintenance)
DNS: root name servers
- Crucial "contact of last resort" for name resolution
- Manages root DNS domain
- Managed by ICANN (Internet Corporation for Assigned Names and Numbers)
- 13 logical root servers worldwide; replicated many times
Top-Level Domain (TLD) and authoritative servers
- Responsible for top-level domains (e.g., .com, .org, .net, .edu)
- Organizations maintain their authoritative DNS servers
- Mapping domain names to IP addresses
Local DNS Name Servers
- When a host makes a DNS query, it's sent to its local DNS server
- Local DNS server returns a reply, possibly using cache of recent name-to-address mappings or forwarding.
- Each ISP has its own local DNS server.
DNS Name Resolution
- Iterated query: Server contacted replies with name of server to contact
- Recursive query: Burden on contacted server to resolve name
Caching DNS Information
- Caching improves response time by caching DNS mappings
- Cache entries timeout (TTL)
- Cached entries may be out-of-date
DNS records
- RR (Resource Record) format: (name, value, type, ttl)
- type=A: name is hostname, value is IP address
- type=NS: name is hostname, value is IP address of authoritative nameserver
DNS Security
- DDoS attacks (bombarding root servers with traffic)
- Spoofing attacks (intercepting DNS queries with bogus replies)
Network Management
- Components of network management (managed device, data, network management protocol)
- Network management approaches (command line interface (CLI), SNMP, NETCONF/YANG)
- SNMP protocol: message types (GetRequest, GetNextRequest, GetBulkRequest, SetRequest, InformRequest, Response)
Remote Procedure Call (RPC)
- RPC is a mechanism, not a protocol; for structuring distributed systems
- Network properties and architectures can vary across computing systems
- Two components: (a) Protocol for message exchange; (b) Programming Language and Compiler Support to enable packaging of arguments (and return values).
RPC Implementations
- SunRPC, IETF ONC RPC, DCE-RPC, CORBA, MS DCOM, ActiveX, gRPC
NETCONF
- goal: actively manage/configure devices network-wide
- Operates between managing server and managed network devices
- Actions: retrieve, set, modify, activate configurations
- Atomic-commit actions over multiple devices
- Query operational data and statistics
- Subscribe to notifications from devices
- Remote procedure call paradigm, using RPC
- NETCONF protocol messages encoded in XML; uses reliable transports (e.g., TLS)
- NETCONF commands such as
, , , , , and
YANG
- Modeling language for representing configuration and Operational State data
- Unifies transport layer protocols, carrying structured data, not raw.
Network Layer
- Forwarding: Move packets from router input to appropriate output
- Routing: Determine packets route from source to destination Methods: Per-router Control (traditional); Logically centralized control (software-defined networks)
IP Datagram Format
- IP Protocol version number
- Header length (bytes)
- Type of service
- Time to live
- Protocol (upper layer such as TCP orUDP)
- Source IP Address
- Destination IP Address
IPv6: Motivation
- 32-bit address space allocation limit (IPv4)
- Improve forwarding/processing speeds (fixed-length 40-byte header)
- Enable network-layer treatment of "flows"
IP Addressing: Introduction
- 32-bit identifier associated with each host/router interface
- Connection between host/router and physical link
- Routers typically have multiple interfaces
- Hosts typically one or two interfaces
DHCP: Dynamic Host Configuration Protocol
- Host dynamically obtains IP address from network server
- Renews address lease
DHCP Client-Server Scenario
- Step-by-step description of DHCP process for a client obtaining IP address information
Generalized Forwarding
Review of match-plus-action forwarding; destination-based vs generalized forwarding; forwarding table entries
OpenFlow examples
- Destination-based forwarding example
- Block (drop) arriving datagrams destined to a specific TCP/UDP port
- Other examples of switch actions based on source or destination IP and/or port number; layer 2 forwarding
Orchestrated forwarding: Summary
- "Match plus Action" abstraction.
- Local actions (e.g. Drop, Forward, Modify)
- "Program" network-wide behavior
- Programmable per-packet processing (simple form of network programmability)
Software-Defined Networking (SDN)
- A network layer: historically implemented with distributed, per-router control Models: monolithic router (hardware), separate Control and data planes
Network Security
- Main goals: confidentiality, authentication, message integrity.
- Tasks in designing a security service
- Cryptanalysis
- Types of security attacks: eavesdropping, impersonation, hijacking, denial-of-service.
- Cryptography: Techniques for disguised data
- Confidentiality, Integrity, Nonrepudiation and Availability.
Cryptographic Hash Functions (Hash Functions)
- Algorithm for computationally infeasible to find (1) an object mapping to predefined hash/digest result; (2) two objects in mapping to any same hash result
- Cryptographic hash functions (e.g.: MD5; SHA): produce fixed-length digests
- Commonly used properties of hash functions.
Message Authentication Code (MAC)
- Alice creates a message m and calculates H(m)
- Append H(m) to message (m, H(m)), sent to Bob ○ Bob calculates H(m) and checks if it's the same as received H(m). if it is, it is valid
- Requires shared secret s (Authentication Key) ○ MAC = H(m+s) (append MAC to message) ○ Bob receives (m, h). Computes H(m+s). Valid if they are equal.
Digital signatures
- authentication, creating a verifiable, nonforgeable code
Public Key Cryptography
- Diffie-Hellman (DH), RSA
- Public-key algorithms and mathematical functions
RSA Algorithm
- Getting ready: mapping messages to integers
- Generating public/private keys ○ choose primes P and Q ○ compute n = pq, z= (p-1)(q-1) ○ choose e that is relatively prime to z ○ choose d such that (ed-1) exactly divisible by Z (in other words: ed mod z = 1).
- Encryption/decryption steps (m < n):
- c = me mod n
- m = cd mod n
Comparison of MAC and digital signatures
- MAC: Does not use public/private key encryption
- Digital signatures: Does use public/private key encryption (two-steps)
Certification Authorities (CAs)
- Bind public keys to particular entities (person, website, etc.) ○ Proof of identity
- Certifies E's public key; digitally signs it
- Standards for CAs (ITU X.509)
IP Security (IPsec)
- Used to protect datagrams across networks
- Security Associations (SA), which define security parameters • Two modes (transport; tunnel) • Protocols: Authentication Header (AH); Encapsulation Security Protocol (ESP)
IKE: Internet Key Exchange
- Key management procedure for IPsec • Manual vs automatic; key establishment • PSK(pre-shared keys) and PKI (public/private key infrastructure) for authentication
Firewalls
- Devices to isolate intranets from larger Internet
- Forms of firewalls (stateless, stateful)
- Access Control Lists (ACLs)
- Intrusion Detection Systems (IDS)
Cloud Computing
- Services delivered remotely and on demand, e.g.: Amazon Web Services (AWS) and Elastic Compute Cloud (EC2) Services; Google App Engine, and Google Apps
- Business drivers (cost reduction, agility, technological innovation)
- Technology innovations (clustering, grid computing, virtualization, containerization)
- Characteristics of cloud computing (demand usage, ubiquitous access)
- Cloud delivery models (IaaS, PaaS, SaaS)
- Cloud deployment models(public, private, hybrid, multicloud)
- Cloud infrastructure mechanisms (virtual servers, containers, hypervisors and related components)
- Cloud usage monitor, automatic scaling listener, failover and other mechanisms
Container Orchestration
- Automated deployment, scaling and management of containerized application
- Key components (Container Runtime, Api Server, Scheduler, Controller Manager, Distributed Key - Value Store, Networking, Storage)
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Related Documents
Description
Test your knowledge on cloud computing security concepts, including intrusion detection systems, load balancers, and cryptography. This quiz covers various topics related to cloud deployment models and security mechanisms, challenging your understanding of their functions and purposes.