Week 6 - Security Tools

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/65

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 5:41 AM on 4/12/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

66 Terms

1
New cards
What is the main purpose of a firewall
To protect networks from network based attacks by filtering traffic
2
New cards
What can a firewall be implemented as
A network device or host based software
3
New cards
What can firewalls examine
IP addresses ports protocol headers payloads sessions and application protocols
4
New cards
What are the four firewall types in this lecture
Packet filtering stateful application proxy and stateful multilayer inspection firewalls
5
New cards
What is a packet filtering firewall
A basic stateless firewall that allows or denies packets using predefined rules
6
New cards
What is an ACL in firewalling
An Access Control List of predefined allow or deny rules
7
New cards
Why is a packet filtering firewall called stateless
It checks each packet in isolation without tracking session context
8
New cards
Which attributes are commonly used in packet filtering rules
Source IP destination IP protocol source port destination port inbound interface and outbound interface
9
New cards
What happens when no firewall rule matches
A default action is applied
10
New cards
What is the safer default firewall action
Default discard
11
New cards
Why is relying only on a remote port dangerous in packet filtering
An attacker may abuse that port to access internal machines
12
New cards
How can the TCP ACK flag help approximate statefulness
It suggests the packet is part of an existing conversation
13
New cards
What are key strengths of packet filtering firewalls
They are simple low cost and fast
14
New cards
What are key weaknesses of packet filtering firewalls
They do not stop application layer attacks and have limited logging and authentication
15
New cards
Why is IP spoofing a concern for packet filtering firewalls
They rely heavily on packet header information that may be forged
16
New cards
What is a stateful firewall
A firewall that tracks client server sessions and checks packets in context
17
New cards
What is the main advantage of a stateful firewall over a packet filtering firewall
It can distinguish valid session traffic from bogus or unsolicited packets
18
New cards
Why must a stateful firewall track outgoing requests
So it can allow replies to high numbered client ports only when they match an existing connection
19
New cards
How can tracking TCP sequence numbers improve firewall security
It helps defend against attacks such as session hijacking
20
New cards
What is an application level firewall
A proxy based firewall that filters traffic at the application layer
21
New cards
What extra services can an application level firewall provide
Caching and logging
22
New cards
How can an application level firewall enforce policy
By blocking or allowing specific applications or services
23
New cards
Why is caching useful in an application level firewall
It saves bandwidth by serving repeated content from cache
24
New cards
What is a circuit level firewall
A firewall that validates session setup and handshakes without inspecting packet contents
25
New cards
How does a circuit level firewall differ from an application level firewall
Circuit level checks sessions while application level checks specific applications or services
26
New cards
What is a stateful multilayer inspection firewall
A firewall that combines packet filtering circuit level and application level filtering
27
New cards
Why are stateful multilayer inspection firewalls powerful
They can filter at network transport and application layers
28
New cards
What is the main trade off of stateful multilayer inspection firewalls
They are the most expensive type
29
New cards
What is a vulnerability
A software flaw or configuration error that lets attackers violate confidentiality integrity or availability
30
New cards
Where can vulnerabilities exist
In all layers of a system
31
New cards
What is the goal of vulnerability scanning
To find weaknesses and services before attackers exploit them
32
New cards
Why is vulnerability scanning considered pre emptive
It aims to remove weaknesses before exploitation
33
New cards
How do attackers use scanning
As reconnaissance before an attack
34
New cards
How are known and new vulnerabilities typically discovered
Known ones by tools and new ones by humans such as researchers or hacker groups
35
New cards
What are the main scanning categories listed
Port scanners network vulnerability scanners and web application vulnerability scanners
36
New cards
What is Nmap an example of
A port scanner
37
New cards
What are Nessus and OpenVAS examples of
Network vulnerability scanners
38
New cards
What is a ping or ICMP scan typically used for
Basic server discovery
39
New cards
In UDP scanning what usually suggests a port is open
No response
40
New cards
In UDP scanning what usually suggests a port is closed
An ICMP unreachable response
41
New cards
In TCP SYN scanning what response suggests an open port
SYN plus ACK
42
New cards
In TCP SYN scanning what response suggests a closed port
RST plus ACK
43
New cards
Why is a full TCP connect scan easy to detect
It completes the three way handshake
44
New cards
What is TCP SYN scanning also called
Half open scanning
45
New cards
Why is TCP SYN scanning stealthier than a full connect scan
Many systems do not log it as a full connection
46
New cards
What result is associated with TCP FIN scanning on an open port
No response
47
New cards
What are CVEs
Standardised names for publicly known vulnerabilities
48
New cards
Who maintains CVE
MITRE
49
New cards
What does NVD add beyond CVE entries
Security metrics such as CVSS scores and vectors
50
New cards
Who maintains NVD
NIST
51
New cards
What is the biggest weakness of vulnerability scanning
It struggles with new and unknown vulnerabilities such as zero days
52
New cards
Why is sandboxing used
To contain untrusted code so it cannot perform unapproved actions
53
New cards
What is confinement in sandboxing
Isolating an application so it cannot do unauthorised actions
54
New cards
At what levels can sandboxing be implemented
Hardware virtual machines system call interposition software fault isolation and application specific methods
55
New cards
What is system call interposition
Intercepting and controlling system calls before they reach the kernel
56
New cards
What does system call interposition allow defenders to enforce
Fine grained security policies on process behaviour
57
New cards
What is a key limitation of system call interposition
Performance overhead and possible bypass if incomplete
58
New cards
What does chroot do
It changes a process root directory to restrict filesystem access to a jail
59
New cards
Why is chroot not a strong security sandbox
It is mainly a filesystem view change and does not fully isolate a malicious program
60
New cards
What practical issue arises when using chroot
Programs and libraries needed inside the jail must also be provided
61
New cards
How can a process escape a chroot jail according to the slides
If it has root privilege
62
New cards
What problem does Software Fault Isolation try to solve
It stops unsafe code in the same address space from corrupting other code or data
63
New cards
How does SFI constrain untrusted code
By adding checks so it only jumps and writes within its own segments
64
New cards
What is the role of the verifier in SFI
To reject code that contains unsafe or privileged instructions
65
New cards
What is one implementation challenge for SFI on x86
Variable length instructions make guard placement harder
66
New cards
What is one major challenge in sandboxing overall
Defining a correct sandboxing policy