Week 5: Firewalls

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/50

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

51 Terms

1
New cards

What is a firewall?

A computer/network security system sitting between the internal network and the rest of the network

<p>A computer/network security system sitting between the internal network and the rest of the network</p>
2
New cards

What are the objectives of firewalls?

To provide access control - preventing bad things from happening without preventing good things from happening

3
New cards

What are the general functionalities of a firewall?

Choke point of control and monitoring, filtering at the protocol layers

Imposes restrictions on network services to allow authorised traffic

Provide Network Address Translation and usage monitoring

Implementing VPNs using IPsec

4
New cards

What is a security policy?

A policy to dictate authorised traffic in both directions

5
New cards

What are the techniques for firewalls to control access?

- Service control (What)

- Direction control (Where)

- User control (Who)

- Behaviour control (How)

6
New cards

What is service control?

Determines the types of Internet services accessible (inbound and outbound) via transport layer ports

7
New cards

What is direction control?

Determines the direction of service requests allowed through the firewall

8
New cards

What is user control?

Controls access to services based on the user attempting access

9
New cards

What is behaviour control?

Controls how particular services are used

10
New cards

What are the types of firewall filtering?

Positive and negative filter

11
New cards

What is a positive filter?

Passes only packets that meet specific criteria (default = discard, using a whitelist)

12
New cards

What is a negative filter?

Rejects any packets that meet specific criteria (default = forward, using a blacklist)

13
New cards

What are the limitations of using a firewall?

Firewalls cannot protect against attacks bypassing them, malware imported via infected devices (like through sneakernet), improperly secured WiFi access, or internal threats

14
New cards

What is sneakernet?

transfer of information by physically moving removable media like CDs/USBs or external hard drives from one computer to another

15
New cards

Why might using firewalls not be suitable for WiFi networks?

If the firewall is placed before the WiFi router, then the attacker can just access wireless encryption and bypass the firewall if they are in close proximity

16
New cards

What is a packet filtering firewall?

A firewall that individually examines and filters packets backed on rules

The foundation of firewalls, simplest and fastest type

17
New cards

What are the default policies for packet filtering firewalls?

Default = discard (positive filtering): Everything is blocked initially, and services must be added case-by-case. This is more conservative

Default = forward (negative filtering): Everything is allowed initially, and threats are blocked as they become known. This is less secure

18
New cards

What are the advantages of packet filtering firewalls?

Packet filtering firewalls are very simple, their rules are transparent to users, and they are very fast

19
New cards

What are the disadvantages of packet filtering firewalls?

Cannot examine upper-layer data and cannot detect application-layer attacks

Logging is only done for access control, cannot authenticate

Vulnerable to attacks exploiting the TCP/IP specification, like IP address spoofing

20
New cards

How are packet filtering firewalls vulnerable to attacks exploiting the TCP/IP specification?

Packet filtering firewalls are generally vulnerable to attacks exploiting weaknesses in the TCP/IP specification, such as network layer address spoofing.

This means they might not be able to identify packets with altered IP addresses

21
New cards

How does the limited number of variables in decision-making make packet filtering firewalls vulnerable?

Packet filtering firewalls are vulnerable to misconfigurations due to the limited number of variables used in their decision-making process.

This can easily lead to the unintended allowance of prohibited traffic

22
New cards

What are the countermeasures that firewalls can take against IP spoofing attacks?

Discard the packets with an inside source address if it arrives on an external interface, and add filters on the router to block the packets

23
New cards

What is a source routing attack and how can it exploit a packet filtering firewall?

In a source routing attack, the sender of a packet can include information specifying the route the packet should take.

An attacker can generate traffic claiming to be from inside the firewall (even if sent from outside) and specify a route hoping to bypass security measures that do not analyse the source routing information

24
New cards

What are countermeasures that firewalls can take against source routing attacks?

Block all source routed packets and discard all packets that use the option

25
New cards

What are tiny fragment attacks and how can it exploit a packet filtering firewall?

Tiny fragment attacks involve splitting header information over several tiny packets using IP fragmentation, forcing the TCP header information into a separate packet fragment.

The attacker hopes the filtering firewall examines only the first fragment and passes the remaining fragments through, thus circumventing filtering rules that depend on TCP header information

26
New cards

What are countermeasures that firewalls can take against tiny fragment attacks?

Discard all fragmented packets using the TCP protocol

Reassemble before checking

Enforce a rule that the first fragment of a packet must contain a predefined minimum amount of the transport header

27
New cards

What is the main problem with traditional packet filters?

Makes filtering decision without considering layer context, so they do not match return packets with outgoing flow

28
New cards

What is a stateful firewall?

A firewall that examines each IP packet in context, keeping track of client-server sessions (TCP connections). They check if each packet belongs to an existing session, making them better at detecting out-of-context or bogus packets

29
New cards

What is the range for TCP port numbers of servers?

Less than 1024

30
New cards

What is the range of TCP port numbers for clients?

Between 1024 and 65535, they are dynamically generated

31
New cards

What is the vulnerability of dynamic generation of TCP ports?

Because the client's port number is dynamically generated, the firewall must permit the inbound network traffic on all the high-numbered ports because it doesn't know which port will be assigned

32
New cards

How does stateful packet filtering work?

There is a directory of outbound TCP connections, and an entry represents a currently established connection

The packet filter allows incoming traffic to high-numbered ports only if they fit the profile of the directory entries

33
New cards

What else can a stateful packet filter keep track of?

TCP sequence numbers to prevent TCP session hijacking

Limited amounts of app data for protocols like FTP and SIP to identify and track related connections

34
New cards

What is an application-level gateway/proxy firewall?

A relay of application-level traffic with full access to the protocol, to determine allowed connections.

35
New cards

What are the advantages of proxy firewalls?

More secure than packet filtering firewalls - only scrutinises a few allowable applications

Easy to log and audit incoming traffic at application level

36
New cards

What are the disadvantages of proxy firewalls?

Needs separate proxies for each service

Additional processing overhead per connection - must examine and forward all traffic in both directions of the connection between end users

37
New cards

What is a circuit-level proxy firewall?

They operate at the session layer (between the transport and application layer) to set up and relay TCP connections without examining the contents - they primarily determine which connections will be allowed

<p>They operate at the session layer (between the transport and application layer) to set up and relay TCP connections without examining the contents - they primarily determine which connections will be allowed</p>
38
New cards

Where are circuit-level proxy firewalls often used?

For outbound connections when internal users are trusted

39
New cards

How many sessions does a circuit-level proxy firewall create?

4 - two for connecting the proxy to the internal network host and the outside host, and two for relaying TCP segments between the connections without examining its contents

40
New cards

Where can firewalls be located?

Firewalls can be located on the premise (personal, host-based, DMZ networks, VPNs, distributed firewalls) or in the cloud (virtual private cloud, public subnet = DMZ, bastion host, DMZ in the cloud)

41
New cards

What is the Demilitarised Zone Network (DMZ)?

A physical or logical subnet that separates an internal LAN from untrusted networks like the Internet, which has an external firewall and an internal firewall

<p>A physical or logical subnet that separates an internal LAN from untrusted networks like the Internet, which has an external firewall and an internal firewall</p>
42
New cards

What does the external firewall in a DMZ do?

Provides basic level of protections for the remainder of the network and is a measure of access control for external connectivity

43
New cards

What does the internal firewall in a DMZ do?

Provides protection from external attacks with more stringent filtering to enterprise servers and workstations

44
New cards

Why does the internal firewall provide two-way protection wrt the DMZ?

It protects the remainder of the network from attacks from the DMZ

It protects DMZ systems from attacks in the internal protected network

45
New cards

What is a distributed firewall?

A configuration involving both standalone firewall devices and host-based firewalls working together under central administrative control, including both internal and external DMZs

<p>A configuration involving both standalone firewall devices and host-based firewalls working together under central administrative control, including both internal and external DMZs</p>
46
New cards

What is a VPN (Virtual Private Network)?

Consists of a set of computers interconnected by an insecure network, using encryption and special protocols (like IPsec5) to provide a secure connection.

47
New cards

How does a VPN perform encryption?

Encryption can be performed by firewall software or a router

48
New cards

What is a VPC (Virtual Private Cloud)?

An on-demand configurable pool of shared resources allocated within a public cloud environment, offering infrastructure as a service

49
New cards

Why is a VPC virtual?

Because the cloud is shared, and a private IP subnet is allocated. Public subnets within a VPC are similar to the DMZ

50
New cards

What is a bastion host?

A system identified by the firewall administrator as a critical strong point in the network's security, serving as a platform for proxy services or externally accessible services

51
New cards

How is a bastion host secured to withstand hostile elements?

Bastion host hardware platform executes a secure version of its operating system, making it a hardened system

Only services that the admin considers essential are installed