Lesson 11: Implementing Secure Network Protocols (11A-11C)

0.0(0)
studied byStudied by 0 people
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/56

flashcard set

Earn XP

Description and Tags

Vocabulary flashcards covering key secure network protocol topics from DHCP/DNS to VPNs, TLS, LDAP, SNMP, SSH, and remote access concepts as presented in the lecture. Each card defines a critical term or concept relevant to implementing secure network protocols.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

57 Terms

1
New cards

DHCP

Dynamic Host Configuration Protocol; automatic IP address allocation; only one DHCP server should offer addresses to a group; rogue servers can cause DoS or spoofed configurations.

2
New cards

Rogue DHCP server

An unauthorized DHCP server that can assign incorrect IP configuration, enabling DoS or man-in-the-middle activities.

3
New cards

DHCP starvation

Attack where a rogue client exhausts the IP address pool by requesting many IPs using spoofed MAC addresses.

4
New cards

DHCP snooping

Switch feature that mitigates rogue DHCP attacks by validating DHCP messages and restricting where DHCP responses can be sent.

5
New cards

DNS

Domain Name System; resolves FQDNs to IPs; uses port 53; distributed database across name servers; critical for network name resolution.

6
New cards

Domain Hijacking

Attack where an adversary gains control of a domain's registration, often through weak credentials or registrar compromise.

7
New cards

DNS poisoning

Attacks that corrupt DNS responses or caches to redirect users to malicious IPs; can involve ARP poisoning or rogue DNS servers.

8
New cards

DNSSEC

DNS Security Extensions; adds cryptographic signing of DNS data to prevent spoofing; relies on Zone Signing Key and Key Signing Key; creates a chain of trust from root to subdomains.

9
New cards

HOSTS file

Local name-to-IP mapping file (UNIX: /etc/hosts, Windows: %SystemRoot%\System32\Drivers\etc\hosts); checked before DNS; susceptible to manipulation for cache poisoning.

10
New cards

DNS footprinting

Exploratory activity to discover DNS information; zone transfers can reveal domain records to rogue servers.

11
New cards

DNS server patching

Regularly applying security updates to DNS server software (e.g., BIND, Microsoft DNS) to mitigate vulnerabilities.

12
New cards

LDAPS

LDAP over TLS; LDAP secured using certificates (port 636); provides encrypted directory authentication.

13
New cards

STARTTLS

Upgrades an existing plaintext LDAP (or other protocol) connection to TLS; used to secure the session.

14
New cards

LDAP

Lightweight Directory Access Protocol; directory services protocol (port 389); supports various authentication methods including anonymous, simple bind, SASL, STARTTLS, and LDAPS.

15
New cards

Access control in LDAP

Policies granting read-only vs read/write access to directory data; often enforced via vendor-specific mechanisms and network ACLs.

16
New cards

NTP

Network Time Protocol; time synchronization over UDP port 123; maintains UTC across devices; stratum levels from source clocks.

17
New cards

NTS

Network Time Security; security extension planned for NTP to protect time synchronization.

18
New cards

SNMP

Simple Network Management Protocol; monitoring protocol with agents and a management system; uses ports 161 (queries) and 162 (traps); relies on community strings or SNMPv3 user-based security.

19
New cards

SNMPv3

SNMP version with encryption and authentication (not plain-text community strings); supports ACLs and encryption.

20
New cards

TLS

Transport Layer Security; cryptographic protocol for securing communications (replaces SSL); uses certificates issued by trusted CAs; commonly on port 443 for HTTPS.

21
New cards

HTTPS

HTTP over TLS; secure web traffic; certificate-based authentication; padlock in browsers indicates secure session.

22
New cards

TLS downgrade attack

Attack where a client and server are forced to use older, weaker TLS versions or ciphers.

23
New cards

TLS cipher suite

Set of algorithms for key exchange, authentication, bulk encryption, and integrity; examples include ECDHE-RSA-AES128-GCM-SHA256 and TLSAES256GCMSHA384.

24
New cards

TLS handshake

Process by which client and server negotiate supported ciphers, exchange keys, and establish a secure session.

25
New cards

S/MIME

Secure/Multipurpose Internet Mail Extensions; uses digital certificates to provide authentication, message integrity, and confidentiality for email.

26
New cards

SMTP TLS (SMTPS/STARTTLS)

Email security via TLS; STARTTLS upgrades an existing SMTP connection; SMTPS initiates TLS on port 465; common ports are 25, 587, and 465.

27
New cards

POP3S

Secure POP3; POP3 over TLS (port 995) for secure retrieval of email.

28
New cards

IMAPS

Secure IMAP; IMAP over TLS (port 993) for secure access to mail on a server.

29
New cards

S/MIME certificates

Digital certificates containing a user’s public key, signed by a CA, used to secure email via S/MIME.

30
New cards

VoIP security

Protection of voice/video over IP; uses SIP/SIPS signaling, SRTP for media encryption, and TLS for signaling integrity.

31
New cards

SIP

Session Initiation Protocol; signaling protocol for establishing VoIP sessions; defaults to port 5060; SIPS uses TLS on port 5061.

32
New cards

SRTP

Secure Real-time Transport Protocol; provides encryption, message integrity, and authentication for RTP streams.

33
New cards

VPN TLS (SSL VPN)

VPN that uses TLS/SSL to secure remote access; often runs on port 443; supports mutual authentication via certificates.

34
New cards

OpenVPN

Open-source TLS VPN implementation; uses TLS for secure tunnels; can operate over TCP/UDP and support TAP/TUN modes.

35
New cards

SSTP

Secure Sockets Tunneling Protocol; Microsoft VPN technology using TLS to secure PPP traffic, typically over TCP port 443.

36
New cards

PPTP

Point-to-Point Tunneling Protocol; legacy VPN protocol with known security weaknesses; generally deprecated.

37
New cards

IPSec

Internet Protocol Security; network-layer security framework providing confidentiality and integrity; uses AH (integrity) and ESP (confidentiality/integrity); supports transport and tunnel modes.

38
New cards

AH

Authentication Header; provides data integrity and authentication for IP packets but not confidentiality.

39
New cards

ESP

Encapsulation Security Payload; provides confidentiality and/or integrity for IP packets; can be used alone or with AH.

40
New cards

IKE

Internet Key Exchange; protocol for negotiating, establishing, and managing Security Associations (SAs) for IPSec; uses DH for key exchange and may use certificates or pre-shared keys.

41
New cards

IKEv2

Improved IKE version with support for EAP, simplified setup, NAT traversal, and MOBIKE for multihoming.

42
New cards

L2TP/IPSec

Layer 2 Tunneling Protocol with IPSec; VPN technique combining L2TP tunneling with IPSec security.

43
New cards

DTLS

Datagram Transport Layer Security; TLS over UDP, used to secure datagrams in environments where UDP is preferred.

44
New cards

RDP

Remote Desktop Protocol; protocol for graphical remote access; can be placed behind a secure gateway or used with SSH tunneling.

45
New cards

Jump server

Secure intermediary server used for out-of-band management to reach devices in a secure zone; reduces exposure of admin interfaces.

46
New cards

SAWs

Secure Admin Workstations; dedicated hardened workstations for administering network devices with restricted access.

47
New cards

SSH

Secure Shell; secure remote command-line access and file transfer (SFTP); default port 22; uses host keys for authenticity.

48
New cards

SSH host key

Public/private key pair identifying an SSH server; must be kept secure; if compromised, keys should be rotated.

49
New cards

SSH authentication methods

Methods for SSH user authentication, including username/password, public key, and Kerberos (GSSAPI).

50
New cards

SSH commands

Common commands for SSH-based administration (ssh, ssh-keygen, scp, etc.) for secure remote management.

51
New cards

Always-On VPN

VPN that automatically establishes a VPN connection whenever a trusted network is detected, using cached credentials.

52
New cards

Split tunnel vs full tunnel

VPN data routing options: split tunnel sends default internet traffic directly; full tunnel routes all traffic through the corporate network.

53
New cards

DNS zone transfers

DNS data transfer between servers; can reveal private DNS records; mitigated by ACLs.

54
New cards

DNSSEC chain of trust

Trust path from root to subdomains through signed zones and DS records, enabling verification of DNS responses.

55
New cards

RADIUS/TACACS+ relevance

AAA authentication protocols used with VPNs and remote access to centralize user credentials.

56
New cards

Federated auth methods (SAML/OAuth)

Standards used to delegate authentication/authorization for APIs and services; require secure management of tokens.

57
New cards

Web APIs and tokens

APIs secured by tokens or secrets; secrets must be managed securely to prevent breaches.