Podcast
Questions and Answers
What is the primary purpose of a firewall in a network?
What is the primary purpose of a firewall in a network?
What is a choke point in a network?
What is a choke point in a network?
What is a personal firewall?
What is a personal firewall?
Which of the following is an example of a firewall?
Which of the following is an example of a firewall?
Signup and view all the answers
What is the purpose of segmenting a network?
What is the purpose of segmenting a network?
Signup and view all the answers
What is a common function of a firewall?
What is a common function of a firewall?
Signup and view all the answers
What is the primary advantage of using WPA2?
What is the primary advantage of using WPA2?
Signup and view all the answers
Which of the following is a type of firewall?
Which of the following is a type of firewall?
Signup and view all the answers
What is the main difference between a firewall and a personal firewall?
What is the main difference between a firewall and a personal firewall?
Signup and view all the answers
What is the primary function of FTP?
What is the primary function of FTP?
Signup and view all the answers
What is the secure equivalent of Telnet?
What is the secure equivalent of Telnet?
Signup and view all the answers
What is the purpose of a honeypot?
What is the purpose of a honeypot?
Signup and view all the answers
What is the name of the tool used for port scanning?
What is the name of the tool used for port scanning?
Signup and view all the answers
What is the name of the tool used for firewall tools?
What is the name of the tool used for firewall tools?
Signup and view all the answers
What is the main advantage of using security tools?
What is the main advantage of using security tools?
Signup and view all the answers
What is the term used to describe new or unpublished attacks or vulnerabilities?
What is the term used to describe new or unpublished attacks or vulnerabilities?
Signup and view all the answers
What is a DMZ typically a combination of?
What is a DMZ typically a combination of?
Signup and view all the answers
Why do we need to ensure the security of devices such as mail servers and web servers?
Why do we need to ensure the security of devices such as mail servers and web servers?
Signup and view all the answers
What is the purpose of putting a layer of protection between the device and the Internet, and between the rest of the network and the device?
What is the purpose of putting a layer of protection between the device and the Internet, and between the rest of the network and the device?
Signup and view all the answers
What do IDSes monitor for?
What do IDSes monitor for?
Signup and view all the answers
What type of IDS monitors the network traffic?
What type of IDS monitors the network traffic?
Signup and view all the answers
What is the method of detection used by Signature-based IDSes?
What is the method of detection used by Signature-based IDSes?
Signup and view all the answers
What is the method of detection used by Anomaly-based IDSes?
What is the method of detection used by Anomaly-based IDSes?
Signup and view all the answers
How do Signature-based IDSes work?
How do Signature-based IDSes work?
Signup and view all the answers
Study Notes
Network Security
- A properly laid out network can prevent some attacks, mitigate others, and fail in a graceful way when necessary.
- Network segmentation can reduce the impact of attacks by dividing a network into smaller subnets, controlling traffic flow between them, and blocking traffic when necessary.
Choke Points
- Choke points are points in the network where traffic is funneled through to inspect, filter, and control traffic.
- Examples of choke points include routers, firewalls, proxies, and application proxies.
Firewalls
- A firewall is a mechanism for controlling traffic that flows into and out of a network.
- Firewalls can allow or disallow traffic based on protocol, allowing Web and e-mail traffic to pass while blocking everything else.
Personal Firewall
- A personal firewall is a lightweight software that controls network traffic to and from a computer, permitting or denying communications based on a security policy.
- Personal firewalls typically work as an application-layer firewall and only protect the computer on which they are installed.
DMZs
- A DMZ (demilitarized zone) is a combination of a network design feature and a protective device, such as a firewall.
- DMZs are used to protect devices that need to be exposed to external networks, such as mail servers, proxy servers, and Web servers.
Network Intrusion Detection Systems
- IDSes monitor networks, hosts, or applications for unauthorized activity.
- There are three types of IDSes: Host-based intrusion detection systems (HIDSes), Application protocol-based intrusion detection systems (APIDSes), and Network-based intrusion detection systems (NIDSes).
IDS Detection Methods
- IDSes are classified into two main categories: signature-based detection and anomaly-based detection.
- Signature-based detection works by comparing incoming traffic to a database of known attack signatures.
- Anomaly-based detection works by taking a baseline of normal traffic and measuring the present state of traffic against it to detect patterns that are not present in normal traffic.
Secure Protocols
- Secure protocols can protect data by using secure equivalents of insecure protocols.
- Examples of secure protocols include Secure Shell (SSH) instead of Telnet, and Secure File Transfer Protocol (SFTP) instead of FTP.
Network Security Tools
- Network security tools can improve network security and are often the same as those used by attackers.
- Examples of security tools include Kismet, coWPAtty, and Aircrack-NG for wireless, Nmap for port scanning, HPing3 for firewall tools, and Tcpdump, WinDump, and OptiView for packet sniffers.
Honeypot
- Honeypots are a controversial tool that can detect, monitor, and sometimes tamper with the activities of an attacker.
- Honeypots are configured to deliberately display vulnerabilities or materials that would make the system attractive to an attacker.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Description
Learn how to prevent and mitigate attacks by properly segmenting a network into smaller subnets, controlling traffic flow and minimizing damage.