Immigration Financial Information Bangladesh Gateway General World Cup Entertainment Programing University and College Scholarship Job Interview Health Job

Thursday, May 10, 2018

Domain 5 (Part -1)

Digital Signature ensures:
- Integrity (i.e message has not been tampered)
- Authentication (i.e message has been actually sent by sender)
- Non-repudiation (i.e sender cannot later deny  about sending the message)

- Digital signature does not provide confidentiality of the message.
- Digital signature encrypts the hash of the message (and not the message). Hence digital signature does not provide confidentiality or privacy.
- For encryption of the hash of the message, private key of the sender is to be used.
- Non-repudiation provides the strongest evidence that a specific transaction/action has occurred.  No one can deny about the transaction/action.

# Best practises for Wireless (Wi-Fi) security:
- Enable MAC address filtering.
- Enable Encryption to protect data in transit.

- Disable SSID (service set identifier) broadcasting.
- Disable DHCP (Dynamic Host Configuration Protocol).

# ‘War Driving’
- Used by hacker for unauthorised access to wireless infrastructure. Wireless equipped computer is used to locate and gain access to wireless networks. Also used by auditors to test wireless.

# WPA-2 (Wi-Fi Protected Access) is the strongest encryption standard for the wireless connection.

# Confidentiality of the data transmitted in a wireless LAN is BEST protected, if the session is encrypted using dynamic keys (as compared to static keys)

Encryption Technique: The techniques will protect data in transit and not on device.
WEP - Wired Equivalent Privacy [Weak]
WPA - Wireless Protected Access [Medium]
WPA-2 - Wireless Protected Access [Strong]

SSID - Makes network visible to all. Technical term for a network name. When setting up a wireless home network, we give it a name to distinguish it from other networks in neighbourhood.

WAR walking
WAR chalking


# Types of Firewall

Application Level [7 -Application Layer] - Provides greatest security environment. works on concept of bastion hosting and proxy server. Separate proxy for each service. Control application like FTP, HTTP etc.
Circuit Level [5 - Session Layer] - works on concept of bastion hosting and proxy server. Same proxy for all services.
Stateful Inspection [3 - Network Layer] - Allows traffic from outside only if it is in response to traffic from internal hosts.
Packet Filtering [3 - Network Layer] - Allow or deny action is done as per IP address and PORT number of source and destination of packets.

# Types of Firewall Implementation

Screened Host:
- One Packet Filtering Router
- One Bastion Host

Dual Homed:
- One Packet Filtering Router.
- One Bastion host with two NIC (Network Interface Card).
- More restrictive form of screened host.

Screened Subnet [DMZ]:
- Two Packet Filtering Router
- One Bastion Host

# Screened Subnet Firewall (DMZ) provides greatest security environment.

# Bastion host
Both Application-Level Firewall as well as Circuit-Level Firewall works on concept of bastion hosting. On the Internet, a bastion host is the only host computer that a company allows to be addressed directly from the public network and that is designed to protect the rest of its network from exposure. Bastion host are heavily forfeited against attack.

Common characteristics of a bastion host are as follows:
-Its Operating system is hardened, in the sense that only essential services are installed on it.
-System should have all the unnecessary services disabled, unneeded ports closed, unused applications removed, unnecessary administrative tools removed i.e  vulnerabilities to be removed to the extent possible.
-It is configured to require additional authentication before a user is granted access to proxy services.
-It is configured to access only specific hosts.

# Proxy
A proxy is a middleman. Proxy stands between internal and external network. Proxy will not allow direct communication between two networks. Proxy technology can work at different layer of OSI model. A proxy based firewall that works at lower layer (session layer) is referred to as circuit-level proxy. A proxy based firewall that works at higher layer (application layer) is called as an application-level proxy.

- Most robust configuration in firewall rule is ‘deny all traffic and allow specific traffic’ (as against ‘allow all traffic and deny specific traffic’).

No comments :

Post a Comment