Generic Security Concepts Review

Slides:



Advertisements
Similar presentations
Computer Networks TCP/IP Protocol Suite.
Advertisements

Security+ All-In-One Edition Chapter 10 – Wireless Security
Chapter 10 Encryption: A Matter of Trust. Awad –Electronic Commerce 1/e © 2002 Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic Algorithm.
Public Key Infrastructure and Applications
Internet Protocol Security (IP Sec)
1 ABCs of PKI TAG Presentation 18 th May 2004 Paul Butler.
Network Security.
Technical Track Securing EtherNet/IP Networks Presented by: Paul Didier - Cisco Eddie Lee - Moxa.
Authenticating Users. Objectives Explain why authentication is a critical aspect of network security Explain why firewalls authenticate and how they identify.
CMSC 414 Computer and Network Security Lecture 26 Jonathan Katz.
Packet Analyzers, a Threat to Network Security. Agenda Introduction The background of packet analyzers LAN technologies & network protocols Communication.
Cryptography and Authentication Lab ECE4112 Group4 Joel Davis Scott Allen Quinn.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 13: Planning Server and Network Security.
DESIGNING A PUBLIC KEY INFRASTRUCTURE
Securing the Borderless Network March 21, 2000 Ted Barlow.
Firewalls and Intrusion Detection Systems
ISA 3200 NETWORK SECURITY Chapter 10: Authenticating Users.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 10 Authenticating Users By Whitman, Mattord, & Austin© 2008 Course Technology.
Chapter 19 Security.
Firewall 2 * Essential Network Security Book Slides. IT352 | Network Security |Najwa AlGhamdi 1.
1 Chapter 6 Network Security Threats. 2 Objectives In this chapter, you will: Learn how to defend against packet sniffers Understand the TCP, UDP, and.
11 SECURING INTERNET MESSAGING Chapter 9. Chapter 9: SECURING INTERNET MESSAGING2 CHAPTER OBJECTIVES  Explain basic concepts of Internet messaging. 
Securing Information Systems
Chapter 19 Security Integrity Security Control –computer-based –non-computer-based PC security DBMS and Web security Risk Analysis Data protection and.
Securing Windows 7 Lesson 10. Objectives Understand authentication and authorization Configure password policies Secure Windows 7 using the Action Center.
1/28/2010 Network Plus Security Review Identify and Describe Security Risks People –Phishing –Passwords Transmissions –Man in middle –Packet sniffing.
SYSTEM ADMINISTRATION Chapter 13 Security Protocols.
CHAPTER 2 PCs on the Internet Suraya Alias. The TCP/IP Suite of Protocols Internet applications – client/server applications The client requested data.
Web Server Administration Chapter 10 Securing the Web Environment.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 3: TCP/IP Architecture.
1 Chapter 9 E- Security. Main security risks 2 (a) Transaction or credit card details stolen in transit. (b) Customer’s credit card details stolen from.
Secure Socket Layer (SSL)
Csci5233 Computer Security1 Bishop: Chapter 27 System Security.
1 Defining Network Security Security is prevention of unwanted information transfer What are the components? –...Physical Security –…Operational Security.
Security+ All-In-One Edition Chapter 14 – and Instant Messaging Brian E. Brzezicki.
Troubleshooting Windows Vista Security Chapter 4.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
每时每刻 可信安全 1The DES algorithm is an example of what type of cryptography? A Secret Key B Two-key C Asymmetric Key D Public Key A.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Types of Electronic Infection
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
Module 9: Fundamentals of Securing Network Communication.
Network access security methods Unit objective Explain the methods of ensuring network access security Explain methods of user authentication.
1 Security Protocols in the Internet Source: Chapter 31 Data Communications & Networking Forouzan Third Edition.
Secure Wired Local Area Network( LAN ) By Sentuya Francis Derrick ID Module code:CT3P50N BSc Computer Networking London Metropolitan University.
TCP/IP (Transmission Control Protocol / Internet Protocol)
Silberschatz, Galvin and Gagne ©2009 Operating System Concepts – 8 th Edition, Security.
Protocols COM211 Communications and Networks CDA College Olga Pelekanou
TCP/IP Protocol Suite 1 Chapter 30 Security Credit: most slides from Forouzan, TCP/IP protocol suit.
MIS 7003 MIS Core Course The MBA Program The University of Tulsa Professor: Akhilesh Bajaj Security: Personal & Business © Akhilesh Bajaj 2004,2005, 2007,
CS/IS 196 Midterm Review Midterm: Monday, November 23.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
Security fundamentals Topic 1 Addressing security threats and vulnerabilities.
CS/IS 196 Final Exam Review Final Exam: Wednesday, December 16.
Don’t Log in!. Recap on the previous units I’ve tried to make it as concise as possible but there is a bit of writing, to ensure that you have some notes.
Quiz 2 -> Exam Topics Fall Chapter 10a - Firewalls Simple Firewall - drops packets based on IP, port Stateful - Keeps track of connections, set.
Syo-401 Question Answer. QUESTION 1 An achievement in providing worldwide Internet security was the signing of certificates associated with which of the.
@Yuan Xue CS 285 Network Security Fall 2012 Yuan Xue.
CS4241: Webware Class 25: A Few Short Topics Web Security 1 Copyright , Michael J. Ciaraldi.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
Chapter 8.  Upon completion of this chapter, you should be able to:  Understand the purpose of a firewall  Name two types of firewalls  Identify common.
Network Security. Permission granted to reproduce for educational use only.© Goodheart-Willcox Co., Inc. Remote Authentication Dial-In User Service (RADIUS)
Security+ All-In-One Edition Chapter 1 – General Security Concepts
Review Slides, Security +
CS/IS 196 Final Exam Review
Implementing Client Security on Windows 2000 and Windows XP Level 150
Securing Windows 7 Lesson 10.
6. Application Software Security
Presentation transcript:

Generic Security Concepts Review Q: What is the CIA triad, what does each mean? Q: What is non-repudiation? Q: Define Layered Security Q: What is the main security reasoning for mandatory vacations?

Generic Security Concepts Review Q: What type of authentication system does the OS (Security Kernel) determined who is allowed access to a resource Q: What access control model helps fight “authorization creep” Q: Biometrics are an example of “What you ____” Q: What is a better security model, network based or host based? Justify your answer.

Chapter 2 – Review Questions Q. What is the best countermeasure against phishing attacks? Q. Why is a hoax still a security concern? Q. Installing camera to read credit card numbers at gas pumps is what type of attack? Q. Does an Organization Security Policy Statement detail specifics such as how to properly encrypt data?

Chapter 2 – Review Questions Q. What is the difference between Due Diligence and Due Care? Q. What is the term for a set of “required steps to be taken” when doing some action called?

Cryptography review Q. Which of the CIA triad does a hash provide? Q. An HMAC is used to try to prevent MiM attacks. Does a HMAC provide non-repudiation? Q. Why don’t we just use Asymmetric Encryption for all encryption? Q. What is Diffie-Hellman primarily used for?

Cryptography review Q. What is AES meant to replace, what is the algorithm that was chosen to be AES? Q. True or false, If I encrypt a message with someone's public key, anyone with the public key can decrypt it. Q. What is the Asymmetric algorithm commonly used in PDAs and cell phones? Q. How many rounds of transposition/substitution does DES have? How about Triple DES?

PKI review questions Q. What is a digital certificate? What is it intended to represent? Q. What are two important pieces of info in a digital certificate Q. Why would you use multiple certificates Q. If you have 100 users, in a 2 certificate model (encryption & signing) how many total keys do you have?

PKI review Q. What is key escrow Q. How do I validate the identity of a certificate that someone has given me? When does the validation chain end? Q. What version of X.509 were extensions added? Q. My certificate has been revoked, how do I “un-revoke it”

Physical Security Review Q. What feature can allow a windows computer to automatically run a Trojan program on an inserted CD or USB drive Q. Which of the following water based automatic fire suppression systems would be best used for a data center. Q. Why is access to a network jack a risk? Q. What is the CER in terms of biometrics Q. What is a type 1 and type 2 error?

Physical Security Review Q. If providing access to a bank vault, would I prefer higher false positives or higher false negatives? Q. What type of fire rating is electrical fires? Q. What is the difference between smart cards and memory cards. Q. What type of motion sensor detects a human through emanated heat?

Chapter 8 - Review Q. What layer of the OSI model does a switch operate at, what addresses does it “switch” Q. What layer of the OSI model does a router look at, what addresses does it “route” Q. What is the purpose of MAC flooding? Q. What is a DNS poisoning attack.

Chapter 8 Review Q. What is a Bastion Host Q. What is the purpose of a DMZ Q. What is NAC/NAP? Q. What is the main purpose of a circuit layer proxy. Q. How is an application layer proxy different than a circuit layer proxy?

Chapter 9 – Review Questions Q. Name the 3 AAA protocols we talked about Q. Which of the following items does Kerberos use. Shared keys Tickets Public keys Digital signatures Q. Does L2TP use TCP or UDP? Q. Explain the difference between CHAP and PAP

Chapter 9 – Review Questions Q. What protocol (TCP/UDP) does Radius use, how about TACACS+ Q. Why is Telnet bad? Q. What is the purpose of a VPN? Q. What protocol does PPTP require for operation?

Chapter 10 – Review Questions Q. What encryption protocol does WEP use Q. What 2 key lengths does WEP support Q. WPA takes the algorithm from WEP and changes the encryption key with every packet. What is this called? T_ _ _ Q. What encryption protocol does WPA2 use? Q. Why is MAC filtering or turning off SSID broadcasting not sufficient security? Q. What does WAP use as the “secure” WAP protocol? W _ _ _

Chapter 10 – Review Questions Q. What is the WAP GAP Q. Define how to accomplish a MiM attack on a wireless network Q. What type of authentication concept would help against the attack above? Q. What is Bluetooth used for? Q. What is Bluesnarfing?

Chapter 11 - IDS Q. What is an IDS? Q. What is the difference between an HIDS and a NIDS Q. What is the difference between a IDS and an IPS? Q. What are two “types” of IDS detection, explain them?

Chapter 11 - IDS Q. What is the purpose of a honey pot? Q. If an IDS detects traffic coming in from the internet with internal IP addresses as the src addresses, why should I be concerned? Q. Which is the first version of Windows that Windows Defender is shipped with? What other Windows OS’es is it available for? Q. Can signature based scanning detect 0days attacks?

Chapter 12 Q. What is a security baseline? Q. What is a windows feature that you can use to push computer settings to all computer in a domain? Q. What is a windows “security template” Q. Does a hot fix generally add new functionality to an OS or application? Q. What is system hardening?

Chapter 12 Q. What is a buffer overflow Q. What are TCP wrappers? Q. Describe Unix File Permissions?

Chapter 12 Define the ports numbers that the following services run on HTTP HTTPS SMTP IMAP POP FTP DNS

Chapter 13 Q. What are the steps in a 3 way handshake Q. What is the difference between a virus and a worm Q. What is a SYN flood Q. What is a Smurf attack

Chapter 13 Q. What is the concept of stealing another persons live TCP communication stream called. Q. What is a replay attack? Q. What is a root kit? Q. What is a vishing attack? (not phishing) Q. What is the best defense for phishing?

Chapter 13 Q. What is a logic bomb Q. What is DDos Q. How are DDoS attacks usually launched?

Chapter 14 Q. What is a problem with POP Q. What is a problem with IMAP Q. Is SMTP encrypted? Does is provide user authentication? Q.What is a real-time Black Hole List?

Chapter 14 Q. What is greylisting? Q. What is S/MIME, which symmetric encryptions methods does it support _ _ 2 & _ _ _ S Q. What “PKI” model does PGP use?

Chapter 15 Q. Why is SSL used for websites? What does SSL and a website provide? Q. What is Active X, what access to your computers does Active X have? Q. What is Java Q. What is application signing?

Chapter 15 Q. What does application signing provide? Q. What restrictions does Java place on unsigned applications? Q. Is safe to run ANY signed java/active X app? Q. Briefly define Cross Site Scripting (XSS) Q. Where does a CGI program run.

Chapter 16 Q. What is a Hot Site Q. What is a warm site. Q. What is a cold Site. Q. What is the difference between a Hot Site and a Mirror Site

Chapter 16 Q. What is a Full Backup Q. What is an incremental Backup Q. What is a differential Backup? Q. What is a continuous Backup?

Chapter 16 Q. What is RAID0 Q. What is RAID1 Q. What is RAID5 Q. If I have 4 30G disks setup as a RAID 5 array, how much actually usable storage do I have?

Chapter 17 Q. Define EF Q. Define SLE Q. Define ARO Q. Define ALE

Chapter 17 Q. Any countermeasure you deploy should ultimately be ______ _______ Q. If my ALE for a threat is $50K a year, and a countermeasure to eliminate the threat costs $30K a year, should I implement it? Q. If my ALE is $50K a year, a countermeasure will reduce the ALE by 50%, and the countermeasure costs 30K a year, should I implement it?

Chapter r17 Q. What is “residual risk” Q. What is risk transference Q. What is risk avoidance Q. What is risk acceptance

Chapter 17 Q. What is quantitative risks analysis, what is qualitative risk analysis? Q. Can you get automated tools for quantitative analysis, how about qualitative analysis. Q. What is due diligence, due care?

Chapter 18 Change management… nothing really here

Chapter 19 Q. What is role based access control Q. What is MAC? Where is it usually used? Q. What is DAC? Where is it usually used? Q. What is rule based access control?

Chapter 19 Q. What is single sign on, name one SSO technology. Q. What is a minimum password age Q. What is a password “history” Q. Name the main components of Kerberos. Does Kerberos every send passwords across the network? Q. What is a major “gotcha” when debugging Kerberos login failures?

Chapter 20 – Review Questions Q. What is the concept of best evidence Q. When you want to do forensics on a computer, you should make a copy of the hard drive. What type of copy should you make? Q. What is the MINIMUM number of copies you should make of the original hard drive

Chapter 20 – Review Questions Q. Put these step of analysis in the correct order Analyze the Drive Power down the system Dump Memory Image the hard drive Q. Why do you run checksums/hashes on the original files before analysis? Q. Why should someone witness you as you collect the evidence? Q. What is the difference between “free space” and “slack space”