Chapter 6 - Firewalls & VPNs

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Remote Authentication Dial-In User Service (RADIUS)

A computer connection system that centralizes the management of user authentication by placing the responsibility for authenticating each user on a central authentication server.

Storage channel

A covert channel that communicates by modifying a stored object.

Port Address Translation (PAT)

A method of mapping a single valid external IP address to special ranges of nonroutable internal IP addresses, known as private addresses, on a one-to-many basis, using port addresses to facilitate the mapping.

Biometric access control

An access control approach based on the use of a measurable human characteristic or trait to authenticate the identity of a proposed systems user (a supplicant).

Attribute-based access control (ABAC)

An access control approach whereby the organization specifies the use of objects based on some attribute of the user or system.

Password

An authentication component that consists of a private word or combination of characters that only the user should know.

False reject rate

In biometric access controls, the percentage of identification instances in which authorized users are denied access. Also known as a Type I error.

False accept rate

In biometric access controls, the percentage of identification instances in which unauthorized users are allowed access. Also known as a Type II error.

Auditability

See accountability.

Subject attribute

See attribute.

Covert channel

Unauthorized or unintended methods of communications hidden inside a computer system.

Secure VPN

a VPN implementation that uses security protocols to encrypt traffic transmitted across unsecured public networks.

Attribute

a characteristic of a subject (user or system) that can be used to restrict access to an object. Also known as a subject attribute.

Hybrid VPN

a combination of trusted and secure VPN implementations.

Timing channel

a covert channel that transmits information by managing the relative timing of events.

MAC layer firewall

a firewall designed to operate at the media access control sublayer of the network's data link layer (Layer 2).

Bastion host

a firewall implementation strategy in which the device is connected directly to the untrusted area of the organization's network rather than being placed in a screened area. Also known as a sacrificial host.

Application layer firewall

a firewall type capable of performing filtering at the application layer of the OSI model, most commonly based on the type of service (for example, HTTP, SMTP, or FTP). Also known as an application firewall. See also proxy server.

Dynamic filtering

a firewall type that can react to an adverse event and update or create its configuration rules to deal with that event.

Stateful packet inspection (SPI)

a firewall type that keeps track of each network connection between internal and external systems using a state table and that expedites the filtering of those communications. Also known as a stateful inspection firewall.

Static filtering

a firewall type that requires the configuration rules to be manually created, sequenced, and modified within the firewall.

Network Address Translation (NAT)

a method of mapping valid external IP addresses to special ranges of nonroutable internal IP addresses, known as private addresses, on a one-to-one basis.

Content filter

a network filter that allows administrators to restrict access to external content from within a network. Also known as a reverse firewall.

Virtual password

a password composed of a seemingly meaningless series of characters derived from a passphrase.

Virtual private network (VPN)

a private and secure network connection between systems that uses the data communication capability of an unsecured and public network.

Reverse proxy

a proxy server that most commonly retrieves information from inside an organization and provides it to a requesting user or system outside the organization.

Kerberos

a remote authentication system that uses symmetric key encryption-based tickets managed in a central database to validate an individual user to various network resources.

Unified Threat Management (UTM)

a security approach that seeks a comprehensive solution for identifying and responding to network-based threats from a variety of sources. UTM brings together firewall and IDPS technology with antimalware, load balancing, content filtering, and data loss prevention. UTM integrates these tools with management, control, and reporting functions.

Extranet

a segment of the DMZ where additional authentication and authorization controls are put into place to provide services that are not available to the general public.

Proxy server

a server or firewall device capable of serving as an intermediary by retrieving information from one network segment and providing it to a requesting user on another..

Screened host firewall

a single firewall or system designed to be externally accessible and protected by placement behind a filtering firewall.

Access control list (ACL)

a specification of an organization's information asset, the users who may access and use it, and their rights and privileges for using the asset.

Capability table

a specification of an organization's users, the information assets that users may access, and their rights and privileges for using the assets. Also known as user profiles or user policies.

Nondiscretionary access controls (NDACs)

a strictly enforced version of MACs that are managed by a central authority in the organization and can be based on an individual user's role or a specified set of tasks.

State table

a tabular database of the state and context of each packet in a conversation between an internal and external user or system. A state table is used to expedite firewall filtering.

Trusted computing base (TCB)

according to the TCSEC, the combination of all hardware, firmware, and software responsible for enforcing the security policy.

Trusted VPN

also known as a legacy VPN, a VPN implementation that uses leased circuits from a service provider who gives contractual assurance that no one else is allowed to use these circuits and that they are properly maintained and protected.

Packet-filtering firewall

also referred to as a filtering firewall, a networking device that examines the header information of data packets that come into a network and determines whether to drop them (deny) or forward them to the next network connection (allow), based on its configuration rules.

Lattice-based access control (LBAC)

an access control approach that uses a matrix or lattice of subjects (users and systems needing access) and objects (resources) to assign privileges. LBAC is an example of an NDAC.

Mandatory access control (MAC)

an access control approach whereby the organization specifies use of resources based on the assignment of data classification schemes to resources and clearance levels to users. MAC is an example of an LBAC approach.

Dumb card

an authentication card that contains digital user data, such as a personal identification number (PIN), against which user input is compared.

Asynchronous token

an authentication component in the form of a token—a card or key fob that contains a computer chip and a liquid crystal display and shows a computer-generated number used to support remote login authentication. This token does not require calibration of the central authentication server; instead, it uses a challenge/response system.

Synchronous token

an authentication component in the form of a token—a card or key fob that contains a computer chip and a liquid crystal display and shows a computer-generated number used to support remote login authentication. This token must be calibrated with the corresponding software on the central authentication server.

Smart card

an authentication component similar to a dumb card that contains a computer chip to verify and validate several pieces of information instead of just a PIN.

Passphrase

an authentication component that consists of an expression known only to the user, from which a virtual password is derived. See also virtual password.

War dialer

an automatic phone-dialing program that dials every number in a configured range to determine if one of the numbers belongs to a computer connection such as a dial-up line.

Screened subnet

an entire network segment that protects externally accessible systems by placing them in a demilitarized zone behind a filtering firewall and protects the internal networks by limiting how external connections can gain access to them..

Task-based access control (TBAC)

an example of a nondiscretionary control where privileges are tied to a task a user performs in an organization and are inherited when a user is assigned to that task. Tasks are considered more temporary than roles. TBAC is an example of an LDAC

Role-based access control (RBAC)

an example of a nondiscretionary control where privileges are tied to the role a user performs in an organization, and are inherited when a user is assigned to that role. Roles are considered more persistent than tasks. RBAC is an example of an LDAC.

Access control matrix

an integration of access control lists (focusing on assets) and capability tables (focusing on users) that results in a matrix with organizational assets listed in the column headings and users listed in the row headings. The matrix contains ACLs in columns for a particular device or asset and capability tables in rows for a particular person.

Demilitarized zone (DMZ)

an intermediate area between two networks designed to provide servers and firewall filtering between a trusted internal network and the outside, untrusted network. Traffic on the outside network carries a higher level of risk.

Discretionary access controls (DACs)

controls that are implemented at the discretion or option of the data user.

Address restrictions

firewall rules designed to prohibit packets with certain addresses or partial addresses from passing through the device.

Strong authentication

in access control, the use of at least two different authentication mechanisms drawn from two different factors of authentication.

Crossover error rate (CER)

in biometric access controls, the level at which the number of false rejections equals the false acceptance. Also known as the equal error rate.

Minutiae

in biometric access controls, unique points of reference that are digitized and stored in an encrypted format when the user's system access credentials are created.

Firewall

in information security, a combination of hardware and software that filters or prevents specific information from moving between the outside network and the inside network. Each organization defines its own firewall.

Application firewall

see application layer firewall.

Sacrificial host

see bastion host.

Reverse firewalls

see content filter.

Accountability

the access control mechanism that ensures all actions on a system—authorized or unauthorized—can be attributed to an authenticated identity. Also known as auditability.

Authorization

the access control mechanism that represents the matching of an authenticated entity to a list of information assets and corresponding access levels.

Authentication

the access control mechanism that requires the validation and verification of a supplicant's purported identity.

Identification

the access control mechanism whereby unverified entities or supplicants who seek access to a resource provide a label by which they are known to the system.

Configuration rules

the instructions a system administrator codes into a server, networking device, or security device to specify how it operates.

Reference monitor

the piece of the system that mediates all access to objects by subjects.

Access control

the selective method by which systems specify who may use a particular resource and how they may use it.

Trusted network

the system of networks inside the organization that contains its information assets and is under the organization's control.

Untrusted network

the system of networks outside the organization over which the organization has not control. The Internet is an example of an untrusted network.

Authentication factors

three mechanisms that provide authentication based on something a supplicant knows, something a supplicant has, and something a supplicant is.


Ensembles d'études connexes

Evolve: Pediatric - Growth and Development

View Set

Ethics/Deductive & Inductive Arguments

View Set

Chapter 3: Individual Differences and Emotions, Chapter 4: Social Perception and Managing Diversity, Chapter 5: Foundations of Employee Motivation, Chapter 7 Positive Organizational Behavior, Chapter 7. Performance Management, Chapter 2: Values and A...

View Set

Insurance adjuster exam questions Test bank

View Set

Baustofftechnologie - Bitumen und Asphalt

View Set

Med Surg 1: Care of Patients with Multi-Drug Resistant Organisms

View Set

Chapter 71: Caring for Clients with Chemical Dependence

View Set