Cybersecurity Fundamentals Part 3

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which activity is primarily focused on understanding vulnerabilities and their potential impacts in network security?

  • Risk Assessment [ID.RA] (correct)
  • Access Control [PR.AC]
  • Asset Management [ID.AM]
  • Network Security Governance [ID.GV]

What is the main purpose of implementing encryption in a network?

  • To enable end-to-end communication between devices
  • To analyze network traffic patterns for anomalies
  • To restrict unauthorized access to network resources
  • To protect data both in transit and at rest (correct)

Which function involves creating actions to follow during a network security event?

  • Log and Event Monitoring [DE.CM]
  • Business Continuity Planning [RC.RP]
  • Risk Assessment [ID.RA]
  • Network Incident Response Plan [RS.RP] (correct)

In the NIST framework, which activity is tasked with training users to recognize security threats?

<p>Security Training [RP.AT] (C)</p> Signup and view all the answers

Which core function of the NIST framework evaluates the effectiveness of incident responses after an event?

<p>Lessons Learned [RC.IM] (A)</p> Signup and view all the answers

What is the main role of Log and Event Monitoring within the Detect function?

<p>To continuously monitor for anomalies and incidents (D)</p> Signup and view all the answers

Which of the following is NOT a component of the Protect function in the NIST framework?

<p>Forensics [RS.AN-3] (B)</p> Signup and view all the answers

At which layer of the TCP/IP model does point-to-point communication between devices mainly occur?

<p>Network Layer (A)</p> Signup and view all the answers

What is the primary goal of access control in network security?

<p>To restrict unauthorized access to network resources (D)</p> Signup and view all the answers

Which of the following is NOT listed as a key responsibility of network security?

<p>Remote user training on device usage (D)</p> Signup and view all the answers

What role do intrusion detection systems (IDS) play in network security?

<p>They continuously monitor network traffic for security incidents (D)</p> Signup and view all the answers

Which of the following best describes perimeter defense in network security?

<p>Filtering incoming and outgoing network traffic (D)</p> Signup and view all the answers

What is the purpose of network vulnerability management?

<p>To identify and fix weaknesses in network configurations (C)</p> Signup and view all the answers

Which secure protocol is specifically mentioned for protecting data in transit?

<p>IPSec (C)</p> Signup and view all the answers

What type of system would be utilized to prevent security incidents effectively?

<p>Intrusion Prevention Systems (IPS) (A)</p> Signup and view all the answers

Which option is least likely to be a focus of network security training?

<p>Enhancing personal productivity tools (A)</p> Signup and view all the answers

What is the primary goal of a Man-in-the-Middle (MitM) attack?

<p>To intercept and manipulate communication. (D)</p> Signup and view all the answers

Which technique is NOT associated with Denial of Service (DoS) attacks?

<p>Session hijacking. (C)</p> Signup and view all the answers

What countermeasure helps mitigate the risk of flooding attacks in Denial of Service (DoS)?

<p>Rate limiting. (A)</p> Signup and view all the answers

What is one common method to detect unauthorized port scanning activities?

<p>Host-based IDS/IPS. (B)</p> Signup and view all the answers

Which of the following best describes the term 'Brute Force Attack'?

<p>Trying multiple username and password combinations to gain access. (B)</p> Signup and view all the answers

Which practice is a key component in mitigating the effects of brute force attacks?

<p>Strong password policies. (A)</p> Signup and view all the answers

What is the purpose of SSL stripping in a Man-in-the-Middle attack?

<p>To intercept and downgrade secure HTTPS connections to HTTP. (D)</p> Signup and view all the answers

Which of the following techniques relies on overwhelming a service with excessive requests?

<p>SYN flood attacks. (C)</p> Signup and view all the answers

What is the primary function of a firewall in network security?

<p>To act as a barrier between trusted and untrusted networks (C)</p> Signup and view all the answers

Which type of firewall inspects packets on a per-packet basis without maintaining any state information?

<p>Packet Filtering Firewalls (B)</p> Signup and view all the answers

What security measure is implemented when a firewall blocks all traffic that does not match its defined rules?

<p>Deny by default (D)</p> Signup and view all the answers

Which of the following is NOT a countermeasure against external threat actors?

<p>Regular employee training sessions (D)</p> Signup and view all the answers

In firewall operations, what does 'filtering' primarily refer to?

<p>Controlling incoming and outgoing network traffic (D)</p> Signup and view all the answers

What is the importance of having a reliable operating system for a firewall?

<p>To ensure firewall immunity to intrusions (C)</p> Signup and view all the answers

What is the role of predefined security policies in firewall functionality?

<p>To establish access rules for incoming and outgoing traffic (A)</p> Signup and view all the answers

Which of the following features is a characteristic of Stateful Inspection Firewalls?

<p>They maintain a record of active connections. (A)</p> Signup and view all the answers

What is the primary function of an Intrusion Detection System (IDS)?

<p>To alert on suspicious activity without taking direct action (B)</p> Signup and view all the answers

Which VPN type allows remote users to connect to the internal network?

<p>Remote access VPN (B)</p> Signup and view all the answers

What is a significant drawback of signature-based detection methods used by IDS/IPS?

<p>They exhibit poor performance with new or previously unseen threats. (A)</p> Signup and view all the answers

Which of the following is not an example of an application layer VPN?

<p>PPTP (D)</p> Signup and view all the answers

What critical flaw in ARP contributes to the possibility of a Man in the Middle (MitM) attack?

<p>ARP lacks authentication for ARP-Reply messages (C)</p> Signup and view all the answers

Which of the following describes a characteristic of the Intrusion Prevention System (IPS)?

<p>It can take proactive measures to block or prevent threats. (C)</p> Signup and view all the answers

Which component of IPsec is responsible for providing encryption using symmetric algorithms?

<p>Encapsulating Security Payload (ESP) (D)</p> Signup and view all the answers

What form of VPN encapsulates IP packets into a secure tunnel?

<p>IPsec Tunnels (C)</p> Signup and view all the answers

What is the primary purpose of the Handshake Protocol in TLS?

<p>To authenticate endpoints and establish a secure connection (A)</p> Signup and view all the answers

Which type of detection method establishes a baseline of normal behavior for alerts on deviations?

<p>Anomaly-based detection (D)</p> Signup and view all the answers

Which of the following protocols specifically addresses the security of DNS queries and responses?

<p>DNSSEC (D)</p> Signup and view all the answers

Which statement accurately describes Host-Based IDS (HIDS)?

<p>It monitors system-level activities and logs on individual devices. (C)</p> Signup and view all the answers

What is the primary function of SSH in secure networking?

<p>To enable secure remote access via encrypted interactive sessions (A)</p> Signup and view all the answers

Which IDS/IPS detection method uses predefined patterns to identify attacks?

<p>Signature-based detection (B)</p> Signup and view all the answers

What type of communication does IPSec primarily secure?

<p>IP communications at the network layer (C)</p> Signup and view all the answers

What type of VPN is designed to offer transport layer encryption?

<p>Wireguard (A)</p> Signup and view all the answers

Which aspect of data does TLS ensure through its Record Protocol?

<p>Encryption and authentication of transferred data (B)</p> Signup and view all the answers

What is a primary use case for SSH?

<p>Secure remote management of servers (D)</p> Signup and view all the answers

Why is ARP spoofing considered a form of local ARP cache poisoning?

<p>It impersonates devices to redirect traffic without detection. (A)</p> Signup and view all the answers

What is a key characteristic of 'secure protocols'?

<p>They enhance standard protocols through cryptographic techniques. (A)</p> Signup and view all the answers

Flashcards

Network Security

A set of measures and strategies implemented to secure a network's infrastructure.

TCP/IP Network Model

A layered model that describes how interconnected devices communicate over a network.

TCP/IP Vulnerabilities

Weaknesses in network protocols or devices that can be exploited by attackers.

Access Control

Strategies designed to protect network resources from unauthorized access.

Signup and view all the flashcards

Firewall

A specialized hardware or software device that filters network traffic based on defined rules.

Signup and view all the flashcards

Virtual Private Network (VPN)

A secure connection over a public network, creating a private tunnel for data transmission.

Signup and view all the flashcards

Intrusion Detection System (IDS)

A dedicated system that monitors network traffic for suspicious activity and alerts administrators of potential threats.

Signup and view all the flashcards

Network Vulnerability Management

The process of identifying and addressing vulnerabilities to strengthen network security.

Signup and view all the flashcards

NIST Cybersecurity Framework

A comprehensive framework outlining key functions for securing computer networks. It emphasizes five core functions: Identify, Protect, Detect, Respond, and Recover.

Signup and view all the flashcards

Asset Management (ID.AM)

The process of creating an inventory of all network resources that need protection, including hardware, software, and data.

Signup and view all the flashcards

Risk Assessment (ID.RA)

Evaluating potential risks to a network, including vulnerabilities, threats, and potential impacts.

Signup and view all the flashcards

Network Security Governance (ID.GV)

Policies and procedures that govern how network security is managed.

Signup and view all the flashcards

Access Control (PR.AC)

Restricting access to network resources based on authorization.

Signup and view all the flashcards

Network Segmentation (PR.AC-5)

Dividing a network into smaller, isolated zones to limit the spread of attacks.

Signup and view all the flashcards

Encryption (PR.DS-2)

Using encryption to protect data while it's being transmitted and while it's stored.

Signup and view all the flashcards

Endpoint Protection (PR.PT)

Security measures implemented on individual network devices to prevent intrusions and malware infections.

Signup and view all the flashcards

Man-in-the-Middle (MitM) Attack

An attacker intercepts and potentially alters communication between two parties without their knowledge. The attacker can eavesdrop, manipulate information, or impersonate one of the parties.

Signup and view all the flashcards

Denial of Service (DoS) Attack

A type of attack that overwhelms a network with excessive traffic or requests, making it unavailable to legitimate users.

Signup and view all the flashcards

Hostile Network Activity

A malicious action aimed at compromising network security, gaining unauthorized access, or disrupting network operations.

Signup and view all the flashcards

Port Scanning

A process of systematically probing a network or system to find open ports and services.

Signup and view all the flashcards

Brute Force Attack

Trying combinations of usernames and passwords to guess valid credentials and gain unauthorized access to a system.

Signup and view all the flashcards

Distributed Denial of Service (DDoS) Attack

A type of attack that uses multiple computers to launch a DoS attack simultaneously, making the attack more powerful and difficult to defend against.

Signup and view all the flashcards

Intrusion Prevention System (IPS)

A security tool that monitors network traffic and actively blocks malicious activity.

Signup and view all the flashcards

ARP (Address Resolution Protocol)

A protocol that helps network devices discover each other's physical addresses (MAC addresses) by mapping IP addresses to MAC addresses.

Signup and view all the flashcards

ARP Spoofing

A type of attack where a malicious actor sends spoofed ARP messages to trick devices into communicating with them instead of the intended recipient.

Signup and view all the flashcards

Secure Protocol

A secure protocol that provides confidentiality, integrity, and authentication for both messages and endpoints.

Signup and view all the flashcards

IPsec (Internet Protocol Security)

A suite of protocols that secure IP communications at the network layer, providing authentication and optional encryption.

Signup and view all the flashcards

TLS (Transport Layer Security)

A secure protocol that creates a secure communication channel between a client and server at the transport layer, providing data integrity, confidentiality, and authentication.

Signup and view all the flashcards

SSH (Secure Shell)

A protocol that provides secure end-to-end encryption for interactive sessions, similar to TLS but with additional user authentication methods.

Signup and view all the flashcards

Perimeter Protection

A set of measures and strategies implemented to protect an organization's network from external threats by securing the perimeter of the network.

Signup and view all the flashcards

OpenVPN

A type of VPN that uses TLS/SSL for encryption, providing a secure connection for data transmission over public networks.

Signup and view all the flashcards

DNSSEC (Domain Name System Security Extensions)

A security extension for DNS that adds cryptographic security to DNS queries and responses, protecting against DNS spoofing.

Signup and view all the flashcards

FTPS (File Transfer Protocol Secure)

An extension of FTP that adds TLS/SSL encryption to secure file transfers.

Signup and view all the flashcards

Security Information and Event Management (SIEM)

A system that monitors network activity, collects data, and analyzes it for security breaches, providing real-time insights and alerts.

Signup and view all the flashcards

Packet Filtering Firewalls

Types of firewalls that examine the contents of network packets to determine whether they match predefined rules, operating at the network or transport layers.

Signup and view all the flashcards

Web Application Firewall (WAF)

A type of firewall designed specifically to protect web applications, filtering and blocking malicious traffic aimed at web servers.

Signup and view all the flashcards

Network Segmentation

Dividing a network into smaller isolated segments, limiting the impact of attacks and preventing their spread across the entire network.

Signup and view all the flashcards

Network Access Control

A network security strategy that employs a set of rules to define and control access to network resources based on user identity and permissions.

Signup and view all the flashcards

VPN (Virtual Private Network)

Secure connection between two entities over a public network, forming a private tunnel for secure data transmission. Often used to connect remote users to a private network or different parts of an organization.

Signup and view all the flashcards

IPsec Tunnels

A network-level VPN that encapsulates entire IP packets within an IPsec protocol before transmission. It's a strong security measure that provides data confidentiality and integrity.

Signup and view all the flashcards

PPTP (Point-to-Point Tunneling Protocol)

A layer 2 protocol used for communication over a VPN. It encapsulates PPP frames within UDP/IP packets, ensuring secure transmission.

Signup and view all the flashcards

Network-Based IDS/IPS (NIDS)

IDS/IPS deployed at specific network locations, such as firewalls or DMZs, to monitor traffic flowing into or out of the network segment.

Signup and view all the flashcards

Host-Based IDS/IPS (HIDS)

IDS/IPS agents installed on individual devices (hosts, servers) to monitor events occurring on the specific device, like system logs or file modifications.

Signup and view all the flashcards

Signature-Based Detection

Method of detection that relies on predefined patterns or signatures to identify known attacks. It's efficient but struggles with new or unknown attacks.

Signup and view all the flashcards

Anomaly-Based Detection

Method of detection that looks for patterns or behaviors significantly different from the established baseline of normal network activity. It can detect new threats but may generate false alarms.

Signup and view all the flashcards

Behavioral Analysis (in IDS/IPS)

Generalized approach to anomaly detection where IDS/IPS looks for abnormal behavior that may not match specific signatures or anomalies. It's effective in detecting new or unknown threats.

Signup and view all the flashcards

Study Notes

Cybersecurity Fundamentals (Part 3)

  • Network Security: A set of measures and strategies to secure network infrastructure, protecting wired/wireless networks, routers, switches, firewalls, servers, and endpoints. Key responsibilities include access control, data protection, network monitoring, and intrusion detection.

Key Responsibilities/Tasks

  • Access Control: Only authorized users and devices can access network resources.
  • Data Protection: Encrypts data in transit and at rest using protocols like IPSec, SSL/TLS to secure sensitive information.
  • Network Monitoring and Logging: Continuous monitoring of network traffic, detecting security incidents, monitoring network activity, analyzing logs to find anomalies, and using IDS/IPS systems to block or alert on suspicious activity and threats.

Network Security (II)

  • Perimeter Defense: Security controls at the network perimeter to filter incoming/outgoing traffic (firewalls and DMZs), monitor/detect intrusion using IDS/IPS, and secure remote access with VPNs.
  • Network Vulnerability Management: Regularly assessing the network for vulnerabilities and taking action to mitigate them, such as ensuring network devices are configured securely (patches/updates), and conducting security assessments (penetration testing).

Network Security (III)

  • Network Security Activities (NIST Framework Core Functions):
    • Identify: Asset Management (ID.AM), Risk Assessment (ID.RA), Network Security Governance (ID.GV).
    • Protect: Access Control (PR.AC), Network Segmentation (PR.AC-5), Encryption (PR.DS-2), Endpoint Protection (PR.PT), Security Training (RP.AT)
    • Detect: Network Traffic Analysis (DE.AE), Log and Event Monitoring (DE.CM), Intrusion Detection (DE.DP)

Network Security (IV)

  • Respond: Network Incident Response Plan (RS.RP), Security Incident Investigation (RS.AN), Mitigation and Containment (RS.MI), Communication and Reporting (RS.CO), Forensics (RS.AN-3)
  • Recover: Business Continuity (BC) Planning (RC.RP), System Restoration (RC.RP), Lessons Learned (RC.IM), Post-Incident Review (RC.IM)

TCP/IP Network Model

  • Key Points: Stacked protocol layers and data encapsulation. This shows a clear relationship between the TCP/IP and OSI models illustrating how protocols and services relate to each layer.

TCP/IP Vulnerabilities, Threats and Attacks

  • Main Weakness: Lack of built-in security, and lack of native methods for encryption, integrity, and authentication.
  • Generic Threats/Attacks:
    • Sniffing: Unauthorized interception/monitoring of network traffic (exploits lack of encryption).
    • Spoofing: Masquerading as something or someone else in a network communication (lack of authentication).
    • Hijacking: Attacker takes control of an established network session/connection between two parties (lack of authentication/integrity and weaknesses in session management).
    • Man-in-the-Middle (MitM) Attacks: Attacker intercepts (and potentially alters) communication between sender and receiver without their knowledge (MitM exploits issues in the network layers).
    • Denial of Service (DoS): Make network resources, services, or applications unavailable to legitimate users by overwhelming them with excessive traffic/requests.
    • Hostile network activity: Actions taken by attackers or malicious actors to compromise network security, gain unauthorized access, or disrupt network operations. This includes actions like port scanning, brute-force attacks.

Secure Protocols

  • Secure protocols: Address security concerns (confidentiality, integrity, authenticity) in data and communications, improving upon the classic TCP/IP functionality. Protocols can be implemented at various layers of the stack, applying cryptographic techniques.

IPsec (Internet Protocol Security)

  • Network Layer (Layer 3): A suite of protocols used to secure IP communications at the network layer. Provides IP packet authentication and (optionally) encryption using HMAC and ESP. IKE provides secure key exchanges. Uses Asymmetric encryption, Different Hellman, Digital Certificates

TLS (Transport Layer Security)

  • Transport Layer (Layer 4): Secure communication channel between a client and server at the transport layer. Provides data integrity, confidentiality, and authentication at the packet level. Uses Handshake Protocol and Record Protocol.

SSH (Secure Shell)

  • Application Layer (Layer 7): Provides end-to-end encryption for interactive sessions, adds user authentication methods such as password and public keys.

Perimeter Protection

  • Objective: Securing an organization's network by protecting the outer boundary (perimeter) from external threats/attacks.
  • Countermeasures:
    • Firewalls and network segmentation
    • Virtual Private Networks (VPNs)
    • Intrusion Detection and Prevention Systems (IDS/IPS)
    • Security Information and Event Management (SIEM) Systems
    • Web Application Firewalls (WAFs), Content Filtering

Firewalls

  • Network Access Control Devices: Barrier between the organization's internal network and the untrusted external network. Uses filtering and controlling incoming/outgoing network traffic based on predefined security rules. All traffic passes through to permit or deny authorized traffic

Virtual Private Networks (VPNs)

  • Extension of a private local network over an uncontrolled public network infrastructure.
  • Typical Function: Establishing secure connections to maintain the confidentiality of traffic, relies on tunneling by creating a logical connection between endpoints, encapsulating one protocol within another. Common use cases include secure interconnection across parts of an organization, and remote access for users to connect to the internal network.
    • Different ways of tunneling

Intrusion Detection/Prevention Systems (IDS/IPS)

  • IDS: Monitors network/system activity for signs of unauthorized access, attacks, or abnormal behavior. Passive and alerts on potential threats.
  • IPS: Same detection methods as IDS, takes automated actions to prevent or mitigate detected threats. Proactive, blocking traffic to/from specific IP addresses, dropping malicious packets, and resetting connections.
  • Deployment Types: Network-based (NIDS) sensors monitor traffic, and host-based (HIDS) agents monitor individual device activities, such as file changes, logs, and system calls.
  • Detection Methods: Signature-based and Anomaly-based.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

More Like This

Cybersecurity Fundamentals Quiz
12 questions
Introduction to Cybersecurity
46 questions

Introduction to Cybersecurity

WellEducatedSacramento avatar
WellEducatedSacramento
Cybersecurity Fundamentals Quiz
50 questions

Cybersecurity Fundamentals Quiz

StatuesqueDidactic3375 avatar
StatuesqueDidactic3375
Cybersecurity Fundamentals
18 questions
Use Quizgecko on...
Browser
Browser