ICF : Block 1 : Units 9-12, 4

0.0(0)
studied byStudied by 0 people
full-widthCall with Kai
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/152

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

153 Terms

1
New cards

NAC: What it stands for

Network Access Control

2
New cards

NAC

Network security solution that allows control of access based on predefined conditions that systems must meet prior to being granted onto a network​.

E.g., NAC can scan a system for operating system updates before allowing it onto a network .

3
New cards

Types of NAC

1) Agent-Based

2) Agentless

4
New cards

Agent-Based NAC

Uses software installed onto clients which authenticates the client to the NAC before scanning and allowing network access.

5
New cards

Types of Agent-Based NAC

1) Permanent Agents

2) Dissolvable Agents

6
New cards

Permanent Agent-Based NAC

Software that is permanently installed, continuously monitoring the system it's installed on.

7
New cards

Dissolvable Agent-Based NAC

Runs the NAC check for a current status of the system but does NOT remain installed.

8
New cards

Agentless NAC

Does NOT require agent software to be installed on a client. (Operates on the server side).

9
New cards

Authentication

Verification process where secured system access requires individuals to identify themselves and for a system to verify that they are who they say they are.

This is a popular approach for hardening a network: ensure that anyone who connects supplies valid credentials before the connection is allowed.

10
New cards

Authentication Factors

1) Something you know

2) Something you have

3) Something you are

4) Somewhere you are

5) Something you do

11
New cards

Examples of something you know to authenticate

- Password

- PIN

12
New cards

Examples of something you have to authenticate

- Physical tokens

- Codes sent via text

13
New cards

Examples of something you are to authenticate

- Fingerprints

- Voice recognitions

14
New cards

Examples of somewhere you are to authenticate

- GPS Location

- IP Address

15
New cards

Examples of something you do to authenticate

- Based on habits

- Typing patterns

16
New cards

MFA: What it stands for

Multifactor Authentication

17
New cards

MFA

Combination of any two or more different authentication factors. It is much safer than any one factor.

18
New cards

SSO: What it stands for

Single Sign On

19
New cards

SSO

Method for users to authenticate once onto a network, then are granted access to multiple systems without the need to provide additional credentials.

20
New cards

Advantages of SSO

For the user: they don't have to remember credentials for multiple systems.

For the administrators: they don't have to manage multiple logon credentials for every user for each server.

21
New cards

Disadvantage of SSO

If an account is compromised, a hacker can now access multiple servers rather than just one.

22
New cards

Network Security Enforcement Methods

- IEEE 802.1X

- Host Health Checks

- Terms of Usage

23
New cards

IEEE: What it stands for

Institute of Electrical and Electronics Engineers

24
New cards

IEEE 802.1X Authentication

A network security enforcement method that requires users to present valid credentials on a system with agent-based NAC.

25
New cards

Host Health Checks

A network security enforcement method that scans a system attempting to connect to the network for OS updates, antivirus software, and host-based firewalls.

26
New cards

Terms of Usage

A network security enforcement method that requires users to accept terms of usage before permitting them access to the network.

27
New cards

AAA: What it stands for

1) Authentication

2) Authorization

3) Accounting

28
New cards

AAA

An information security framework used to:

- control access to data and system resources

- enforce policies

- audit actions

29
New cards

Identification

Presenting information about yourself to a system, like a username or keycard.

<p>Presenting information about yourself to a system, like a username or keycard.</p>
30
New cards

Difference between identification and authentication

Identification: you claim to be someone (e.g., you type in your username)

Authentication: the validity of your claim to be that someone is determined (e.g., you type in your password and hit login)

31
New cards

Authorization

Determines what a user has the authority to do and access.

32
New cards

Accounting

Tracks and records users' access time, bandwidth usage, and use of system resources with system logs.

33
New cards

AAA Protocols

1) RADIUS

2) DIAMETER

*FS

34
New cards

RADIUS: What it stands for *NT

Remote Authentication Dial-In User Service

*NT

35
New cards

RADIUS *NT

Allows clients to access a network remotely through UDP to a RAIDUS server.

*NT

36
New cards

UDP: What it stands for *NT

User Datagram Protocol

*NT

37
New cards

DIAMETER: What it stands for *NT

No acronym, it's just called DIAMETER.

*NT

38
New cards

DIAMETER *NT

Newer AAA protocol that gives a more reliable and secure communication service through TCP.

*NT

39
New cards

TCP: What it stands for *NT

Transmission Control Protocol

*NT

40
New cards

Application Security

Ensuring the integrity of software.

41
New cards

Application Vulnerabilities

1) P2P File Sharing

2) XSS

42
New cards

P2P: What it stands for

Peer to Peer

43
New cards

P2P File Sharing

An application vulnerability where users can share files online through P2P file sharing applications. Common method of transmitting malicious code.

<p>An application vulnerability where users can share files online through P2P file sharing applications. Common method of transmitting malicious code.</p>
44
New cards

Scripting

A computer script has a list of commands to be performed by a program or scripting engine, automating processes on a computer or generating web pages. Makes modifications to a system without user input.

45
New cards

Cross Site Scripting (XSS)

An application vulnerability where malicious code is injected into a website.

E.g., this can trigger compromising user accounts, activating Trojan horses, misleading users into revealing private data, and stealing session cookies to impersonate users.

<p>An application vulnerability where malicious code is injected into a website.</p><p>E.g., this can trigger compromising user accounts, activating Trojan horses, misleading users into revealing private data, and stealing session cookies to impersonate users.</p>
46
New cards

Application Vulnerability Prevention Methods

1) Apply Software Patches.

2) Application Configuration Baseline.

3) Application Hardening.

4) Cross-Site Request Forgery Prevention.

47
New cards

Apply Software Patches

An application vulnerability prevention method where any software being used is kept up to date to patch out vulnerabilities (applications and OS's)​.

48
New cards

Application Configuration Baseline

An application vulnerability prevention method where the software that your network uses should be configured with security in mind.

Any options that can be modified to make the application more secure should be done, as long as necessary functionality is not impeded​.

49
New cards

Application Hardening

An application vulnerability prevention method where you disable unnecessary application features.

50
New cards

Cross-Site Request Forgery Prevention

An application vulnerability prevention method to prevent websites that reference another web page that take the user’s unexpired cookies for authentication; “Remember Me” should be disabled in the browser​.

51
New cards

Hardware Security Threats

1) Boot Sequence Threats

2) Removable Storage Threats

3) Theft

52
New cards

Host Intrusion Control Types

1) IDS

2) IPS

*FS: these can be either host-based (HIDS/HIPS) or network-based (NIDS/NIPS)​

53
New cards

IDS: What it stands for

Intrusion Detection System

54
New cards

IDS

Detects suspicious activity on a host or a network, logs it, and alerts system or network administrators. ​

55
New cards

IPS: What it stands for

Intrusion Prevention System

56
New cards

IPS

Monitors hosts or networks for suspicious activity and takes corrective actions.

57
New cards

Hardware Security

Vulnerability protection that comes in the form of a physical device.

58
New cards

Boot Sequence Threats

Hardware security threat that interferes with the boot sequence.

59
New cards

How to prevent Boot Sequence Threats

Enable the "Secure Boot" and "Trusted Boot" settings from within the BIOS to prevent malware and corrupted components from loading as Windows is starting up.​

60
New cards

Removable Storage Threats

Hardware security threat that comes in the form of USB drives and external hard drives; they are an easy way to store and carry information.

61
New cards

How to prevent Removable Storage Threats

1) Alerts

(e.g., on many bases, plugging a USB drive in will trigger a Host Based Security System (HBSS) alert & offender will lose network access rights)

2) Physically disable ports or restrict physical access to data systems.

*USB data ports are disabled on DoD computers to prevent data theft and to prevent worms from spreading.

62
New cards

Theft

Hardware security threat: devices are investments and must be protected (e.g., laptops, switches, routers, monitors, removable storage drives).

63
New cards

How to prevent Theft

Facilities should be protected through limited physical access.

- Access to server rooms should be controlled to protect routers, switches and servers. ​

- Portable devices can be secured with lockdown cables and secured to desks. ​

- Removable media and removable drives should be stored in a locked safe, cabinet or drawer.​

64
New cards

Hardware Encryption

Uses chips physically installed in the system and applies very complex encryption more quickly than software encryption​.

65
New cards

Types of Hardware Encryption

1) Storage Drive Encryption

2) FDE

66
New cards

Storage Drive Encryption

Permanent & removable storage devices, such as hard drives & USB drives, can and should be encrypted.​

67
New cards

FDE: What it stands for

Full Disk Encryption

68
New cards

FDE

Encrypts an entire hard disk drive in case of theft or loss​.

69
New cards

FDE Types

1) TMP

2) HSM

*FS

70
New cards

TPM: What it stands for

Trusted Platform Module

71
New cards

TPM *NT

*NT: Stores cryptographic keys used to encrypt data, located on the motherboard.

(e.g., BitLocker encrypts your files and saves the keys in the TPM; without the BitLocker key, an encrypted Windows 7 machine cannot boot up).

72
New cards

HSM: What it stands for

Hardware Security Module

73
New cards

HSM *NT

*NT: Stores crypto processors on a separate card installed on a system.

74
New cards

Firewalls

Hardware or software that protects computers and networks from outside systems on the other side.

<p>Hardware or software that protects computers and networks from outside systems on the other side.</p>
75
New cards

Allowlisting

Denying everything by default and only allowing trusted traffic into the network.

76
New cards

Denylisting

Allowing everything by default and only blocking known bad traffic from entering the network.

77
New cards

Allowlisting vs Denylisting

Allowlisting is more secure than denylisting but requires the user to sacrifice accessibility and ease of use.​

78
New cards

Software-Based Firewall

Piece of software that is installed on a single system to protect it.

79
New cards

Software-Based Firewall Features

1) Blocks incoming and outgoing traffic; packets sent to/from the system from a host on the network or internet can be blocked.

2) Notifications; shows message if someone tries to connect to your system or if an application tries to send data out.

3) Default rule; denies all traffic except the packets you specify.

4) Create rules; allows you to add rules on top of the default rule to customize what traffic is permitted/denied to enter/leave the system.

80
New cards

What Software-Based Firewalls are also known as

1) Application-based firewalls

2) Host-based firewalls

3) Personal firewalls

81
New cards

Windows Firewall

The software firewall that comes with Windows OS. Its features include:

- Allow a Program or Feature through​

- Change Notification Settings​

- Turn Windows Firewall on/off​

- Restore Defaults​

- Advanced Settings

82
New cards

Hardware-Based Firewall

Stand-alone appliance that acts as a secure gateway between devices inside the network perimeter and those outside.

83
New cards

Hardware-Based Firewall Features

1) More Efficient

- Funnel protection through single point​

- Don't consume processing power of a host device​

- Ideal for medium-large networks​

2) More Complex: require more knowledge to configure and manage.

84
New cards

Types of Firewalls

1) Packet filtering

2) Stateful inspection

3) Application Layer

85
New cards

Packet-Filtering Firewall

Filters based on source/destination IP/Port.

AKA: Stateless Firewall

*FS: least advanced

86
New cards

Stateful Inspection Firewall

Checks if the packet is part of a new or ongoing communication.

E.g., allow all outbound packets, but only allow inbound packets in response to outbound requests.

*FS: mid advanced

<p>Checks if the packet is part of a new or ongoing communication. </p><p>E.g., allow all outbound packets, but only allow inbound packets in response to outbound requests.</p><p>*FS: mid advanced</p>
87
New cards

Deep Packet Inspection

Understands how protocols operate and can view packet contents to provide filtering.

<p>Understands how protocols operate and can view packet contents to provide filtering.</p>
88
New cards

Application Layer Firewall

Combines Packet, Stateful, Application, and Deep Packet Inspection. Can also include IDS/IPS and anti-malware.

AKA: Next Generation

*FS: most advanced

89
New cards

Firewall Security Zones

Segmenting a network into zones to control communication between them for protection.

90
New cards

Main Security Zones

1) Private Zone

2) Demilitarized Zone (DMZ)

3) Public Zone

*FS

91
New cards

Private Zone

Security zone that can only be accessed by authorized users. This is where the LAN should be placed; no traffic from other networks is sent to the private LAN.

AKA: private zone, private LAN, or intranet zone

92
New cards

LAN: What it stands for

Local Area Network

93
New cards

DMZ: What it stands for

Demilitarized Zone

94
New cards

DMZ

Security zone that occupies the space between two firewalls. Allows selected traffic from Internet to pass through its external firewall. This is where you place any servers that need to be reached by the public (web, SMTP, FTP, or DNS).

Internal firewall (private side) does not allow any traffic originating from the public to pass through it.

95
New cards

Public Zone

Security zone that has any network not controlled by the admin (i.e., the Internet).

96
New cards

ESD: What it stands for

Electrostatic Discharge

97
New cards

ESD

Sudden flow of electricity between two charged objects.

98
New cards

Ways to avoid ESD

1) Grounding

2) Bonding

99
New cards

Grounding

Provides a path for electric charges to flow safely into the ground, avoiding ESD.

<p>Provides a path for electric charges to flow safely into the ground, avoiding ESD.</p>
100
New cards

Bonding

Minimizes potential differences between conductive objects, avoiding ESD.