Cyber Security Chapter 6 - Firewalls

¡Supera tus tareas y exámenes ahora con Quizwiz!

filtering methods

(1) stateful packet inspection filtering (2) static packet filtering (3) network address translation (4) application proxy filtering (5) intrusion prevention system filtering (6) antivirus filtering

false alarms

IDSs tend to be ignored after exhausted security staff members receive too many ________.

pass/deny decision

If an attack pack is provable, the firewall drops the packet. If it is not a provable attack packet, the firewall passes the packet to its destination.

internal firewalls

Many firms have __________ which filter traffic passing between different parts of the sites internal network

service field

The _______ field describes the service to be filtered. Often, this will be TCP or UDP, plus the port number or name of an application. It may also be ICMP or some other type of service defined by the number in the IP header's protocol field.

track field

The _______ field describes what the firewall should do after taking its action. This may be nothing ("none"), logging the information in a log file, or alerting someone.

action field

The _________ field says what firewalls should do with this service. The most obvious actions are Pass and Drop. Another possible action is Authenticate, which tells the firewall to authenticate the user. Other special-handling actions can be defined depending on the firm's specific policy.

firewalls field

The _________ field tells the firewall management server what firewalls or routers should be sent to ACLs based upon this policy.

source field and destination field

These can be host names, or they can be groups of IP addresses. Some groups are defined automatically by the system. The firewall administrator must define other groups manually.

policy number field

This field has a unique number for each policy. Policies can therefore be referred to by number.

black holing

a rule is added to the firewall to block all traffic from that IP address

demilitarized zone (DMZ)

a subnet that contains all of the servers and application proxy firewalls that must be accessible to the outside world

NAT traversal

allowing applications that were not designed to work with network address translation

multihomed

connects to multiple subnets

Access control lists (ACLs)

consist of a series of rules that are exceptions to the default behaviors

well-known port numbers

designate specific applications running on the server

socket

designates a specific program on a specific computer

state

distinct phase in connection between two applications

network address translation (NAT)

does not actually filter packets but effectively provides a great deal of protection. it is used in firewalls that use various types of examination methods as a second type of protection can thwart sniffers

unified threat management (UTM) firewalls

embrace both traditional firewall filtering methods and antivirus filtering

intrusion detection systems (IDSs)

examine streams of packets to look for suspicious activities that indicate possible attacks

application specific integrated circuits(ASICs)

filtering in hardward

ingress filtering

firewall examines packets entering the network from the outside. The purpose of this is to stop attack packets from entering the firm's internal network

firewall policy management system

has a firewall policy database holding the firms firewall policies

firewall policies

high-level statements to guide firewall implementers

vulnerability testing

it is important to conduct _____________________ after installation in order to detect errors.

connection

link between programs on different machines. consists of two sockets: - internal socket - external socket

deep packet inspection

looks at all the fields in the packet. including the IP header, the TCP or UDP header, and the application message

static packet filtering

looks at packets one at a time, in isolation

anomaly detection

looks at traffic patterns that indicate that some kind of attack is underway

wire speed

maximum speed of the lines that connect to it.

zero-day attacks

new attacks that are made before signatures are defined

connections

persistent conversations between different programs on different computers

sniffers

placed outside of corporate networks by hackers. allows attacker to learn about the network's host IP addresses and open port numbers on servers without sending probe packets.

Tor network

provides almost completely anonymous access to the Internet. uses a series of encrypted relay nodes to forward packets from senders to receivers

border firewall

sits at the boundary between the corporate site and the external Internet

intrusion prevention systems (IPSs)

stop attacks instead of merely identifying them and generating alarms

screening border router

stops simple high-volume attacks and ensures that responses to external scanning probes cannot reach an external attacker

exit nodes

the Tor node that ends up reaching the destination webserver

egress filtering

the firewall filters packets when they are leaving the network

ICMP echo probes

used in IP address scanning

Tor nodes

used to relay data between senders and receivers

stateful packet inspection (SPI)

uses specific examination methods depending on the state of the connection. used by nearly all corporate firewalls today.

it will drop packets it cannot process

what does a firewall do if it becomes overloaded with traffic?

default

what you get if you do not specify something specifically

Log file

where information about each dropped packet is stored. The process is called logging.


Conjuntos de estudio relacionados

Government Reassessment (Last one)

View Set

Chapter 16 HW & Quiz: Cardiovascular Emergencies

View Set

Inquizitive Documenting Sources: MLA Style

View Set

Ch 17, ch 18, ch 19, CH 20, ch 22, ch 21

View Set

organization and management exam 2

View Set

Normal postpartum part2-70번부터새버전

View Set

A&P II EXAM #2 (Ch. 16-18) Study Guide & Self-Guided Review Questions

View Set