• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/25

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

25 Cards in this Set

  • Front
  • Back

What is a firewall?

A piece of software or hardware that controls incoming and outgoing network traffic.

A firewall filters traffic based upon a given ______ _______.

rule set

What does a firewall separate?

A firewall separates trusted and untrusted networks.

Where are firewalls used? (3)

1. Routers
2. Computers
3. Watchdog devices

What types of firewalls will I encounter in Linux? (3)

1. IP Tables
2. system-config-firewall-tui
3. UFW

What does UFW stand for?

Uncomplicated firewall.

What is UFW?

Is used on debian based distro's and was designed to be an easy
to use and understand command line firewall. This is another front
end software that runs on IPTables.

What are IPTables?

Is comprised of the nefilter kernel module and the Iptables software. The software works upon tables and chains that allow you the customize when and where traffic is either permitted or denied.

What is system-config-firewall-tui?

GUI Version of IPTables

This software is the most commonly used command line GUI of IPTables.

IPtables is built upon tables and chains that filter all network traffic 3 chains: (3)

1. Input: traffic originating from another computer destined to our computer.

2. Output: traffic originating from out computer destined for another computer.

3. Forward: traffic passing through the computer (if your computer is acting as a router).

________ __________ are added to each of these chains. When this is matched, it either ACCEPTs or DROPs the packet.

Filtering rules.

What is bastion host?

A bastion host is defined as a "hardened server" that is exposed to foreign networks and grants access to our own.

What is server hardening?

Server hardening is the process of installing and configuring software to make a server as secure as possible.

Server hardening includes the following 6 things.

1. Installing patches
2. Enhance security on sudo access
3. Understanding logs and how to maintain them (chattr +a logs)
4. Securing SSH
5. Remove FTP and other insecure software
6. Disable Root Account

What 4 pieces of software are used to harden a server?

1. Tripwire
2. Snort
3. SSHGuard
4. AppArmor

What 2 server hardening softwares to do use in this class?

1. Tripwire
2. Snort

What 2 commands do we run to ensure that the server is up to date so that any exploit that may be present for the server is patched?

sudo yum update

sudo yum upgrade

_______ is the Linux equivalent of the attrib command in DOS.

Chattr

What does the chattr -i flag do?

The -i flag allows us to set a file to immutable. This means the file unable to be altered, renamed, or have a shortcut created to it.

What does the chattr -a flag do?

The -a flag allows the administrator to make a file append mode only. This option is perfect for log files.

After changing the file permissions we can view the alterations using the ___________ command.

lsattr

What is the command to disable root account?

sudo passwd -l root

What is the command to enable root account?

sudo passwd -u root

What is Tripwire?

Tripwire is an Intrusion Detection System (IDS). Think of Tripwire as a house alarm. Only notifying you if your house has been broken into. The problem with IDS's is they only deter criminals, They do not prevent them. Please note that tripwire is not support by Redhat.



Tripwire keeps a database about information on all core files in the operating system. Then once a day does a scan for these files and sees if anything has changed. After the scan has completed tripwire emails you the results.

What is Snort?

Snort is a real time intrusion prevention system (IPS): This is the same type of security that is used in bank vaults.



The criminal breaks into the bank and needs a passcode to enter the vault. The criminal enters the wrong passcode and gets locked out of the vault. Metal bars come down and separate the criminal and vault.