Networking Authentication and Security Chapter 1

  1. Intrusion Detection System (IDS)
    Provides real-time detection of certain types of attacks while they are in progress
  2. Intrusion Prevention System (IPS)
    Devices enable the detection of malicious activity and have the ability to automatically block the attack in real-time
  3. Types of Firewalls (2)
    • Packet Filtering
    • Stateful
  4. 3 Components of Information Security
    • Confidentiality
    • Integrity
    • Availability
  5. Wardriving
    Users gain unauthorized access to networks via wireless access points
  6. 10 best practices to mitigate attacks
    • Keep patches up-to-date
    • shut down unnecessary ports and services
    • use strong passwords and change them often
    • control physical access to systems
    • avoid unnecessary web page inputs
    • perform backups and test the backups
    • educate employees about the risks of social engineering
    • encrypt and password protect sensitive data
    • implement security hardware and software
    • develop a written security policy
  7. 3 NFP Functional Areas
    • Control Plane
    • Management Plane
    • Data Plane
  8. Data Plane Definition and Protocols
    Responsible for forwarding data
  9. Control Plane Definition and Protocols
    • Responsible for routing data correctly
    • ARP, OSPF
  10. Management Plane Definition and Protocols
    • Responsible for managing network elements
    • Telnet, SSH, TFTP, FTP, NTP, AAA, SNMP
  11. Control Plane Security
    • Cisco AutoSecure
    • Routing Protocol Authentication
    • Control Plane Policing (CoPP)
  12. Management Plane Security
    • Login and password policy
    • present legal notification
    • ensure the confidentiality of data
    • role-based access control (RBAC)
    • Authorize actions
    • Enable management access reporting
  13. Data Plane Security
    • ACLs
    • Antispoofing
    • Layer 2 security features
Author
jal128
ID
294217
Card Set
Networking Authentication and Security Chapter 1
Description
Networking Authentication and Security Chapter 1 Review Questions
Updated