Firewalls Flashcards

(11 cards)

1
Q

What is IP spoofing

A

IP Spoofing sending packets using a source IP address that is not yours
Often related to DoS attacks (DNS amplification attack)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Name two strategies how a firewall can be implemented

A

stateful, stateless

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Name all the firewall architectures

A
  • Screened Subnet Architecture
  • ScreenedHostArchitecture
    -Dual Homed Bastion Host
  • Simple packet filtering Architecture
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are NIDS and HIDS?

A

Network based IDS
- Unauthorized network access
- Reconnaissance network scans
- Abuse of bandwidth resources
- network protocol violations

Host based IDS
- Privilege Abuse
- Accidentally assigned privileges
- Account compromise
- Access and modificatin of critical data
- Information leakage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the benefit of Screened Subnet Architecture?

A

There are 2 Filters beside the Bastion Host
There is a second packet filter in case a service in DMZ is compromised

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the three security components?

A

Security Requirements
Security Policy
Security Mechanisms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Spoofing Protection

A

Outgoing
- Only allow source IPs which belong to you
- Dont be an operator who facilitates DOS attacks to the Internet
Incoming
- Only allow ‘valid’ source IPs
- For a varying definition fo ‘valid’
- IPs which belong to you are not valid
- local and special purpose IPs are not valid
Rule of thumb: UNIV \ (Your IPs U Special Purpose IPs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Name two Firewall default strategies and which one should we choose

A

Default deny strategy
- only explicitly allowed traffic is permitted
- minimizes attack surface
Default permit strategy
- allow everything by default

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How does a stateful firewall work

A
  • tracks the state of connections
  • Maintains a connection table
  • Allows packets that belong to an established or related connection
  • Only the initial packet must match a rule, replies are allowed automatically
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Upside and Downside of a stateless firewall

A

Upside:
High performance
- No connection tracking
- Less memory and CPU usage

Downside
- No connection awareness
- Return traffic must be explicitly allowed
-More error-prone configuration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Would you add HIDS to the web and Mail server, what would be the trade offs

A

The HIDS could monitor the machines for attacks that compromise configuration integrity on the server itself. However, running a HIDS would add performance drawbacks by real time monitoring of the host activity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly