What are firewalls?
Firewalls monitor and filters network traffic using DMZ, zone segregation, and can be implemented as hardware or software appliance.
What are firewalls rules and policies?
They are set rules to tell a firewall what to do; eg. deny all incoming TCP traffic in all ports.
How does firewall help?
- Limit DoS/DDoS
What is packet filtering firewall?
What’s the difference between stateless and stateful firewalls?
What is a Network Intrusion Detection System?
NDIS detects unauthorized access to networks and host resources without needing traffic flow through it.
How are NIDS connected to networks?
- Switch: port mirroring
What can NDIS do?
What is a Network Intrusion Prevention System?
Similar to NIDS but also provide automated responses to block intrusions and protect system against attacks.
It is located inbetween firewall and the network.
What are proxy firewalls?
Application gateway that protects network resources by redirecting web requests at the application layer.
Scans for Layer 7 protocols like HTTP & FTP with DPI.
Provides private or anonymous internet access.
What are virtual private networks?
VPNs allows you to extend a private network across a public one such as the internet; hence encrypted and cannot be read.
What are the three VPN subsystems?
What are some IPSec vulnerabilities?
Oracle attack can be used to bypass authentication and spoof clients & servers.
IKEv2 susceptible to offline dictionary attacks.
What are some TLS VPN vulnerabilities?
What is a honeypot?
It is a decoy (often a VM) that is designed to be intentionally vulnerable that should look like a production environment.