You will explore network protocols and how network communication can introduce vulnerabilities. In addition, you’ll learn about common security measures, like firewalls, that help network operations remain safe and reliable.
Learning Objectives
- Recognize network protocols
- Describe the protocol(s) used to transmit and access data over wireless networks
- Describe a firewall
- Identify common network security measures and protocols
- Introduction to network protocols
- Video: Welcome to module 2
- Video: Network protocols
- Reading: Common network protocols
- Reading: Additional network protocols
- Video: Antara: Working in network security
- Video: Wireless protocols
- Reading: The evolution of wireless security protocols
- Practice Quiz: Test your knowledge: Recognize different network protocols
- Video: Firewalls and network security measures
- Video: Virtual private networks (VPNs)
- Video: Security zones
- Conclusion
Introduction to network protocols
Video: Welcome to module 2
This section of the program will teach you about the tools and protocols that are used to operate and protect networks. These concepts are essential for security analysts, as they need to be able to identify and mitigate attacks that exploit vulnerabilities in networks.
Key takeaways:
- Malicious actors can take advantage of data moving from one device to another on a network.
- Tools and protocols exist to protect networks from these types of threats.
- Some common network protocols include TCP/IP, HTTP, and HTTPS.
- Virtual private networks (VPNs) can be used to create a secure connection over a public network.
- Firewall security zones and proxy servers can be used to control traffic and protect networks from unauthorized access.
Conclusion:
This section of the program will provide you with the knowledge and skills you need to protect networks from cyberattacks.
Congratulations on the
progress you’ve made so far! In this section,
you’ll learn about how networks operate using
tools and protocols. These are the concepts
that you’ll use every day in your work as
a security analyst. The tools and protocols you’ll
learn in this section of the program will
help you protect your organization’s
network from attacks. Did you know that malicious
actors can take advantage of data moving from one device
to another on a network? Thankfully, there are tools and protocols to ensure the network stays protected against
this type of threat. As an example, I once
identified an attack based solely on
the fact they were using the wrong protocol. The network traffic
volumes were right, and it was coming from a trusted IP, but it was on the wrong protocol, which tipped us off
enough to shut down the attack before they
caused real damage. First, we’ll discuss some
common network protocols. Then we’ll discuss virtual
private networks, or VPNs. And finally, we’ll learn about firewall security zones
and proxy servers. Now that you have an
idea of where we’re headed, let’s get started.
Video: Network protocols
Network protocols are a set of rules that govern how devices on a network communicate with each other. There are many different types of network protocols, each with its own specific purpose.
Some common network protocols include:
- TCP (Transmission Control Protocol): TCP is responsible for ensuring that data is delivered reliably and in order.
- ARP (Address Resolution Protocol): ARP is responsible for translating IP addresses to MAC addresses.
- HTTPS (Hypertext Transfer Protocol Secure): HTTPS is a secure version of the HTTP protocol that encrypts data using SSL/TLS.
- DNS (Domain Name System): DNS is responsible for translating domain names to IP addresses.
Network protocols are essential for the operation of networks and play a vital role in security. For example, HTTPS helps to protect data from being intercepted by malicious actors.
Key takeaways:
- Network protocols are a set of rules that govern how devices on a network communicate with each other.
- There are many different types of network protocols, each with its own specific purpose.
- Some common network protocols include TCP, ARP, HTTPS, and DNS.
- Network protocols are essential for the operation of networks and play a vital role in security.
Conclusion:
This lesson has provided you with a basic understanding of network protocols and their importance in security. As you continue your career as a security analyst, you will learn more about specific network protocols and how to use them to protect networks from cyberattacks.
Tutorial on Network Protocols in Cybersecurity
What are network protocols?
Network protocols are a set of rules that govern how devices on a network communicate with each other. They define the format of the data that is transmitted, the order in which it is transmitted, and how errors are handled. Network protocols are essential for the operation of networks, and they play a vital role in security.
Common network protocols
There are many different types of network protocols, each with its own specific purpose. Some common network protocols include:
- TCP (Transmission Control Protocol): TCP is responsible for ensuring that data is delivered reliably and in order.
- UDP (User Datagram Protocol): UDP is a simpler protocol than TCP and is not responsible for ensuring reliable delivery of data. It is often used for applications where speed is more important than reliability, such as streaming video or audio.
- IP (Internet Protocol): IP is responsible for routing packets of data across a network.
- ICMP (Internet Control Message Protocol): ICMP is used to send error messages and other control messages between devices on a network.
- HTTP (Hypertext Transfer Protocol): HTTP is the protocol used to transfer web pages and other resources over the internet.
- HTTPS (Hypertext Transfer Protocol Secure): HTTPS is a secure version of HTTP that encrypts data using SSL/TLS.
- DNS (Domain Name System): DNS is used to translate domain names, such as
www.google.com
, to IP addresses.
Network protocols and security
Network protocols play an important role in security by helping to protect data from being intercepted or modified by malicious actors. For example, HTTPS encrypts data transmitted between a web browser and a web server, making it difficult for eavesdroppers to intercept the data.
Network protocols can also be used to implement security controls, such as firewalls and intrusion detection systems. Firewalls can be used to block unauthorized traffic from entering a network, while intrusion detection systems can be used to monitor network traffic for suspicious activity.
How to learn more about network protocols
There are many resources available to help you learn more about network protocols. Some good places to start include:
- The RFC (Request for Comments) repository: The RFC repository contains the official specifications for most network protocols.
- The IETF (Internet Engineering Task Force) website: The IETF is the organization responsible for developing and maintaining internet standards.
- Books and online courses: There are many books and online courses available that teach about network protocols.
Conclusion
Network protocols are an essential part of cybersecurity. By understanding how network protocols work, you can better protect your networks and data from cyberattacks.
Which protocol allows two or more devices to form a connection and stream data?
Transmission Control Protocol (TCP)
TCP is an internet communication protocol that allows two devices to form a connection and stream data.
Networks benefit
from having rules. Rules ensure that data sent over the network gets to
the right place. These rules are known
as network protocols. Network protocols are a set of rules used by two
or more devices on a network to describe
the order of delivery and the
structure of the data. Let’s use a scenario
to demonstrate a few different types
of network protocols and how they work
together on a network. Say you want to access your
favorite recipe website. You go to the address
bar at the top of your browser and type in
the website’s address. For example:
www.yummyrecipesforme.org. Before you gain access
to the website, your device will establish communications
with a web server. That communication
uses a protocol called the Transmission Control
Protocol, or TCP. TCP is an internet communications
protocol that allows two devices to form a
connection and stream data. TCP also verifies both devices before allowing any further
communications to take place. This is often referred
to as a handshake. Once communication is established
using a TCP handshake, a request is made
to the network. Using our example,
we have requested data from the Yummy
Recipes For Me server. Their servers will respond
to that request and send data packets back to your device so that you
can view the web page. As data packets move
across the network, they move between network
devices such as routers. The Address Resolution
Protocol, or ARP, is used to determine the MAC address of the next router or
device on the path. This ensures that the data
gets to the right place. Now the communication has been established and the
destination device is known, it’s time to access the
Yummy Recipes For Me website. The Hypertext Transfer
Protocol Secure, or HTTPS, is a network protocol that
provides a secure method of communication between
client and website servers. It allows your web browser
to securely send a request for a webpage to the Yummy
Recipes For Me server and receive a webpage
as a response. Next comes a protocol called the Domain Name System, or DNS, which is a network
protocol that translate internet domain names
into IP addresses. The DNS protocol sends the domain name and
the web address to a DNS server that retrieves the IP address of the website
you were trying to access, in this case, Yummy
Recipes For Me. The IP address is included
as a destination address for the data packets traveling to the Yummy Recipes
For Me web server. So just by visiting one website, the device on your networks are using four different protocols: TCP, ARP, HTTPS, and DNS. These are just some
of the protocols used in network communications. To help you learn more about
the different protocols, we’ll discuss them further in an upcoming course material. But how do these protocols
relate to security? Well, on the Yummy Recipes
For Me website example, we used HTTPS, which is a secure protocol that requests a webpage
from a web server. HTTPS encrypts data using the Secure Sockets Layer and
Transport Layer Security, otherwise known as SSL/TLS. This helps keep the
information secure from malicious actors who want to
steal valuable information. That’s a lot of information and a lot of protocols to remember. Throughout your career
as a security analyst, you’ll become more familiar with network protocols and use them
in your daily activities.
Reading: Common network protocols
Reading
In this section of the course, you learned about network protocols and how they organize communication over a network. This reading will discuss network protocols in more depth and review some basic protocols that you have learned previously. You will also learn new protocols and discuss some of the ways protocols are involved in network security.
Overview of network protocols
A network protocol is a set of rules used by two or more devices on a network to describe the order of delivery and the structure of data. Network protocols serve as instructions that come with the information in the data packet. These instructions tell the receiving device what to do with the data. Protocols are like a common language that allows devices all across the world to communicate with and understand each other.
Even though network protocols perform an essential function in network communication, security analysts should still understand their associated security implications. Some protocols have vulnerabilities that malicious actors exploit. For example, a nefarious actor could use the Domain Name System (DNS) protocol, which resolves web addresses to IP addresses, to divert traffic from a legitimate website to a malicious website containing malware. You’ll learn more about this topic in upcoming course materials.
Three categories of network protocols
Network protocols can be divided into three main categories: communication protocols, management protocols, and security protocols. There are dozens of different network protocols, but you don’t need to memorize all of them for an entry-level security analyst role. However, it’s important for you to know the ones listed in this reading.
Communication protocols
Communication protocols govern the exchange of information in network transmission. They dictate how the data is transmitted between devices and the timing of the communication. They also include methods to recover data lost in transit. Here are a few of them.
- Transmission Control Protocol (TCP) is an internet communication protocol that allows two devices to form a connection and stream data. TCP uses a three-way handshake process. First, the device sends a synchronize (SYN) request to a server. Then the server responds with a SYN/ACK packet to acknowledge receipt of the device’s request. Once the server receives the final ACK packet from the device, a TCP connection is established. In the TCP/IP model, TCP occurs at the transport layer.
- User Datagram Protocol (UDP) is a connectionless protocol that does not establish a connection between devices before a transmission. This makes it less reliable than TCP. But it also means that it works well for transmissions that need to get to their destination quickly. For example, one use of UDP is for internet gaming transmissions. In the TCP/IP model, UDP occurs at the transport layer.
- Hypertext Transfer Protocol (HTTP) is an application layer protocol that provides a method of communication between clients and website servers. HTTP uses port 80. HTTP is considered insecure, so it is being replaced on most websites by a secure version, called HTTPS. However, there are still many websites that use the insecure HTTP protocol. In the TCP/IP model, HTTP occurs at the application layer.
- Domain Name System (DNS) is a protocol that translates internet domain names into IP addresses. When a client computer wishes to access a website domain using their internet browser, a query is sent to a dedicated DNS server. The DNS server then looks up the IP address that corresponds to the website domain. DNS normally uses UDP on port 53. However, if the DNS reply to a request is large, it will switch to using the TCP protocol. In the TCP/IP model, DNS occurs at the application layer.
Management Protocols
The next category of network protocols is management protocols. Management protocols are used for monitoring and managing activity on a network. They include protocols for error reporting and optimizing performance on the network.
- Simple Network Management Protocol (SNMP) is a network protocol used for monitoring and managing devices on a network. SNMP can reset a password on a network device or change its baseline configuration. It can also send requests to network devices for a report on how much of the network’s bandwidth is being used up. In the TCP/IP model, SNMP occurs at the application layer.
- Internet Control Message Protocol (ICMP) is an internet protocol used by devices to tell each other about data transmission errors across the network. ICMP is used by a receiving device to send a report to the sending device about the data transmission. ICMP is commonly used as a quick way to troubleshoot network connectivity and latency by issuing the “ping” command on a Linux operating system. In the TCP/IP model, ICMP occurs at the internet layer.
Security Protocols
Security protocols are network protocols that ensure that data is sent and received securely across a network. Security protocols use encryption algorithms to protect data in transit. Below are some common security protocols.
- Hypertext Transfer Protocol Secure (HTTPS) is a network protocol that provides a secure method of communication between clients and website servers. HTTPS is a secure version of HTTP that uses secure sockets layer/transport layer security (SSL/TLS) encryption on all transmissions so that malicious actors cannot read the information contained. HTTPS uses port 443. In the TCP/IP model, HTTPS occurs at the application layer.
- Secure File Transfer Protocol (SFTP) is a secure protocol used to transfer files from one device to another over a network. SFTP uses secure shell (SSH), typically through TCP port 22. SSH uses Advanced Encryption Standard (AES) and other types of encryption to ensure that unintended recipients cannot intercept the transmissions. In the TCP/IP model, SFTP occurs at the application layer. SFTP is used often with cloud storage. Every time a user uploads or downloads a file from cloud storage, the file is transferred using the SFTP protocol.
Note: The encryption protocols mentioned do not conceal the source or destination IP address of network traffic. This means a malicious actor can still learn some basic information about the network traffic if they intercept it.
Key takeaways
The protocols you learned about in this reading are basic networking protocols that entry-level cybersecurity analysts should know. Understanding how protocols function on a network is essential. Cybersecurity analysts can leverage their knowledge of protocols to successfully mitigate vulnerabilities on a network and potentially prevent future attacks.
Reading: Additional network protocols
Reading
In previous readings and videos, you learned how network protocols organize the sending and receiving of data across a network. You also learned that protocols can be divided into three categories: communication protocols, management protocols, and security protocols.
This reading will introduce you to a few additional concepts and protocols that will come up regularly in your work as a security analyst. Some protocols are assigned port numbers by the Internet Assigned Numbers Authority (IANA). These port numbers are included in the description of each protocol, if assigned.
Network Address Translation
The devices on your local home or office network each have a private IP address that they use to communicate directly with each other. In order for the devices with private IP addresses to communicate with the public internet, they need to have a public IP address. Otherwise, responses will not be routed correctly. Instead of having a dedicated public IP address for each of the devices on the local network, the router can replace a private source IP address with its public IP address and perform the reverse operation for responses. This process is known as Network Address Translation (NAT) and it generally requires a router or firewall to be specifically configured to perform NAT. NAT is a part of layer 2 (internet layer) and layer 3 (transport layer) of the TCP/IP model.
Private IP Addresses | Public IP Addresses |
---|---|
Assigned by network adminsUnique only within private networkNo cost to useAddress ranges:10.0.0.0-10.255.255.255172.16.0.0-172.31.255.255192.168.0.0-192.168.255.255 | Assigned by ISP and IANAUnique address in global internetCosts to lease a public IP addressAddress ranges:1.0.0.0-9.255.255.25511.0.0.0-126.255.255.255128.0.0.0-172.15.255.255172.32.0.0-192.167.255.255192.169.0.0-233.255.255.255 |
Dynamic Host Configuration Protocol
Dynamic Host Configuration Protocol (DHCP) is in the management family of network protocols. DHCP is an application layer protocol used on a network to configure devices. It assigns a unique IP address and provides the addresses of the appropriate DNS server and default gateway for each device. DHCP servers operate on UDP port 67 while DHCP clients operate on UDP port 68.
Address Resolution Protocol
By now, you are familiar with IP and MAC addresses. You’ve learned that each device on a network has both an IP address that identifies it on the network and a MAC address that is unique to that network interface. A device’s IP address may change over time, but its MAC address is permanent. Address Resolution Protocol (ARP) is mainly a network access layer protocol in the TCP/IP model used to translate the IP addresses that are found in data packets into the MAC address of the hardware device.
Each device on the network performs ARP and keeps track of matching IP and MAC addresses in an ARP cache. ARP does not have a specific port number.
Telnet
Telnet is an application layer protocol that allows a device to communicate with another device or server. Telnet sends all information in clear text. It uses command line prompts to control another device similar to secure shell (SSH), but Telnet is not as secure as SSH. Telnet can be used to connect to local or remote devices and uses TCP port 23.
Secure shell
Secure shell protocol (SSH) is used to create a secure connection with a remote system. This application layer protocol provides an alternative for secure authentication and encrypted communication. SSH operates over the TCP port 22 and is a replacement for less secure protocols, such as Telnet.
Post office protocol
Post office protocol (POP) is an application layer (layer 4 of the TCP/IP model) protocol used to manage and retrieve email from a mail server. Many organizations have a dedicated mail server on the network that handles incoming and outgoing mail for users on the network. User devices will send requests to the remote mail server and download email messages locally. If you have ever refreshed your email application and had new emails populate in your inbox, you are experiencing POP and internet message access protocol (IMAP) in action. Unencrypted, plaintext authentication uses TCP/UDP port 110 and encrypted emails use Secure Sockets Layer/Transport Layer Security (SSL/TLS) over TCP/UDP port 995. When using POP, mail has to finish downloading on a local device before it can be read and it does not allow a user to sync emails.
Internet Message Access Protocol (IMAP)
IMAP is used for incoming email. It downloads the headers of emails, but not the content. The content remains on the email server, which allows users to access their email from multiple devices. IMAP uses TCP port 143 for unencrypted email and TCP port 993 over the TLS protocol. Using IMAP allows users to partially read email before it is finished downloading and to sync emails. However, IMAP is slower than POP3.
Simple Mail Transfer Protocol
Simple Mail Transfer Protocol (SMTP) is used to transmit and route email from the sender to the recipient’s address. SMTP works with Message Transfer Agent (MTA) software, which searches DNS servers to resolve email addresses to IP addresses, to ensure emails reach their intended destination. SMTP uses TCP/UDP port 25 for unencrypted emails and TCP/UDP port 587 using TLS for encrypted emails. The TCP port 25 is often used by high-volume spam. SMTP helps to filter out spam by regulating how many emails a source can send at a time.
Protocols and port numbers
Remember that port numbers are used by network devices to determine what should be done with the information contained in each data packet once they reach their destination. Firewalls can filter out unwanted traffic based on port numbers. For example, an organization may configure a firewall to only allow access to TCP port 995 (POP3) by IP addresses belonging to the organization.
As a security analyst, you will need to know about many of the protocols and port numbers mentioned in this course. They may be used to determine your technical knowledge in interviews, so it’s a good idea to memorize them. You will also learn about new protocols on the job in a security position.
Key takeaways
As a cybersecurity analyst, you will encounter various common protocols in your everyday work. The protocols covered in this reading include NAT, DHCP, ARP, Telnet, SSH, POP3, IMAP, and SMTP. It is equally important to understand where each protocol is structured in the TCP/IP model and which ports they occupy.
Protocol | Port |
---|---|
DHCP | UDP port 67 (servers)UDP port 68 (clients) |
ARP | none |
Telnet | TCP port 23 |
SSH | TCP port 22 |
POP3 | TCP/UDP port 110 (unencrypted)TCP/UDP port 995 (encrypted, SSL/TLS) |
IMAP | TCP port 143 (unencrypted)TCP port 993 (encrypted, SSL/TLS) |
SMTP | TCP/UDP port 587 (encrypted, TLS) |
Video: Antara: Working in network security
Antara is a network security engineer at Google. She started her career in electronics and communication, but pivoted into cybersecurity after her first job. She has a master’s degree in security and is passionate about solving puzzles.
A typical day in the life of an entry-level network security engineer might involve debugging problems with endpoints, setting up lab recreations to reproduce issues, and consulting with experts from other domains.
Some of the best practices in network security that Antara has learned are:
- Don’t reinvent the wheel. Use tried and tested protocols and algorithms that have been deemed secure.
- Focus on solving unsolved challenges instead of trying to solve the same problem in a different way.
Antara feels that cybersecurity is a great field to get into right now because it is constantly evolving and there are always new challenges to come up with.
Key takeaways:
- Network security is a complex and challenging field, but it is also very rewarding.
- There are many resources available to help you learn about network security, such as books, online courses, and the RFC repository.
- It is important to stay up-to-date on the latest cybersecurity threats and trends.
- Cybersecurity is a great field to get into right now because it is constantly evolving and there are always new challenges to come up with.
[MUSIC] My name is Antara, I work on the Enterprise Infrastructure
Protection Team at Google. And our main job
responsibility is to protect the infrastructure that all
the amazing Google products run on. I didn’t start with a background in
computers, and I did my undergrad in electronics and communication,
which is far away from computers. I took up the challenge to actually
pivot into computers with my first job. That actually led me to explore
the security world even more. And that’s how it led to doing my masters
in security, getting expertise in that area and then come to Google
as a security engineer. A typical day in the life of
an entry-level network security engineer would start with solving a problem. Maybe you’re trying to debug, why is
this particular endpoint flooded with so much traffic? Or why is this endpoint
actually slowing down? And you would start with, okay,
let me get to the endpoint. Let me capture some traffic
on the endpoint and see what kind of traffic is coming in and
going out through this endpoint. So I would typically go back,
think about the problem during lunch. Sometimes things would click. When you’re thinking you might not have
thought about a problem from a different perspective, you might want to
actually see how it looks like. So you would go about maybe
doing a lab recreate. Let me connect these endpoints and
let me try to reproduce the issue. You might see some things in the lab
recreate that you might have not thought of. And you might need to actually consult
with experts from different domains who might know better about this area. Get their view on what the problem is,
analyze, show them everything that you have done. You might get your solution
just by talking to people. It’s a pretty busy day, but
it’s also a very fun day. It’s like solving puzzles all the time,
which is pretty exciting. Some of the best practices in network
security that I’ve learned are, don’t try to always reinvent the wheel. There are certain protocols, there are certain algorithms
that have been tried, tested, analyzed, and they have been deemed secure
for being used in network security. The time that you spend on reinventing
the wheel is not going to give you the benefits that you need. So it’s always good to think about
the unsolved challenges instead of trying to solve the same
problem in a different way. I feel cybersecurity is actually a great
field to get into right now, because, as you see, we are in this information
age where tech is exponentially growing. Just getting into this field is just
going to be exciting because there are amazing new challenges
coming up in this field.
Video: Wireless protocols
The IEEE 802.11 family of standards, also known as Wi-Fi, is a set of protocols that define communications for wireless LANs. Wi-Fi protocols have evolved over the years to become more secure and reliable, with the most recent version, WPA3, offering the highest level of security.
As a security analyst, you may be responsible for making sure that the wireless connections in your organization are secure. Here are some security measures you can take:
- Use WPA3 or WPA2 security protocols.
- Use strong passwords or passphrases for your Wi-Fi network.
- Keep your router’s firmware up to date.
- Enable MAC address filtering to restrict access to your network to known devices.
- Consider using a VPN when connecting to public Wi-Fi networks.
Key takeaways:
- WPA3 and WPA2 are the most secure Wi-Fi security protocols.
- Use strong passwords or passphrases for your Wi-Fi network.
- Keep your router’s firmware up to date.
- Enable MAC address filtering to restrict access to your network to known devices.
- Consider using a VPN when connecting to public Wi-Fi networks.
By following these security measures, you can help to protect your organization’s wireless networks from cyberattacks.
Tutorial on Wireless Protocols in Cybersecurity
What are wireless protocols?
Wireless protocols are a set of rules that govern how devices on a wireless network communicate with each other. They define the format of the data that is transmitted, the order in which it is transmitted, and how errors are handled. Wireless protocols are essential for the operation of wireless networks, and they play a vital role in security.
Common wireless protocols
Some common wireless protocols include:
- IEEE 802.11 (Wi-Fi): IEEE 802.11 is the most common wireless protocol and is used in a wide variety of devices, including laptops, smartphones, and tablets.
- Bluetooth: Bluetooth is a wireless protocol that is used for short-range communication between devices such as smartphones, headphones, and speakers.
- Zigbee: Zigbee is a wireless protocol that is used for low-power communication between devices in smart homes and other applications.
- Cellular: Cellular networks are used for mobile communication between devices such as smartphones and cell towers.
Wireless protocols and security
Wireless protocols play an important role in security by helping to protect data from being intercepted or modified by malicious actors. For example, WPA3 and WPA2 are Wi-Fi security protocols that encrypt data transmitted between devices, making it difficult for eavesdroppers to intercept the data.
However, wireless protocols can also be vulnerable to attack. For example, older Wi-Fi security protocols such as WEP are relatively easy to crack. Additionally, wireless networks can be susceptible to denial-of-service attacks, which can flood the network with traffic and make it unavailable to legitimate users.
Security best practices for wireless networks
Here are some security best practices for wireless networks:
- Use the latest security protocols, such as WPA3 and WPA2 for Wi-Fi.
- Use strong passwords or passphrases for your wireless networks.
- Keep your router’s firmware up to date.
- Enable MAC address filtering to restrict access to your network to known devices.
- Disable SSID broadcasting to make your network less visible to attackers.
- Consider using a VPN when connecting to public Wi-Fi networks.
By following these security best practices, you can help to protect your wireless networks from cyberattacks.
Additional tips
Here are some additional tips for improving the security of your wireless networks:
- Place your router in a central location to maximize its range and minimize dead spots.
- Use a directional antenna to focus your router’s signal in the desired direction.
- Change the default username and password for your router.
- Disable remote administration of your router unless you need it.
- Monitor your network traffic for suspicious activity.
By following these tips, you can help to create a more secure wireless network.
What is IEEE 802.11 commonly known as?
Wi-Fi
IEEE 802.11 is commonly known as Wi-Fi. It is a set of standards that define communication for wireless LANs.
So far, you’ve learned about a variety of network protocols, including communication
protocols like TCP/IP. Now we’re going to
go more in depth into a class of
communication protocols called the IEEE802.11. IEEE802.11, commonly
known as Wi-Fi, is a set of standards
that define communications for
wireless LANs. IEEE stands for the Institute of Electrical
and Electronics Engineers, which is an organization that
maintains Wi-Fi standards, and 802.11 is a suite of protocols used in
wireless communications. Wi-Fi protocols have adapted over the years to become
more secure and reliable to provide the same level of security as a wired connection. In 2004, a security protocol called
the Wi-Fi Protected Access, or WPA, was introduced. WPA is a wireless
security protocol for devices to connect
to the internet. Since then, WPA has evolved into newer versions,
like WPA2 and WPA3, which include further
security improvements, like more advanced encryption. As a security analyst, you might be responsible
for making sure that the wireless connections in
your organization are secure. Let’s learn more about
security measures.
Reading: The evolution of wireless security protocols
Reading
In the early days of the internet, all internet communication happened across physical cables. It wasn’t until the mid-1980s that authorities in the United States designated a spectrum of radio wave frequencies that could be used without a license, so there was more opportunity for the internet to expand.
In the late 1990s and early 2000s, technologies were developed to send and receive data over radio. Today, users access wireless internet through laptops, smart phones, tablets, and desktops. Smart devices, like thermostats, door locks, and security cameras, also use wireless internet to communicate with each other and with services on the internet.
Introduction to wireless communication protocols
Many people today refer to wireless internet as Wi-Fi. Wi-Fi refers to a set of standards that define communication for wireless LANs. Wi-Fi is a marketing term commissioned by the Wireless Ethernet Compatibility Alliance (WECA). WECA has since renamed their organization Wi-Fi Alliance.
Wi-Fi standards and protocols are based on the 802.11 family of internet communication standards determined by the Institute of Electrical and Electronics Engineers (IEEE). So, as a security analyst, you might also see Wi-Fi referred to as IEEE 802.11.
Wi-Fi communications are secured by wireless networking protocols. Wireless security protocols have evolved over the years, helping to identify and resolve vulnerabilities with more advanced wireless technologies.
In this reading, you will learn about the evolution of wireless security protocols from WEP to WPA, WPA2, and WPA3. You’ll also learn how the Wireless Application Protocol was used for mobile internet communications.
Wired Equivalent Privacy
Wired equivalent privacy (WEP) is a wireless security protocol designed to provide users with the same level of privacy on wireless network connections as they have on wired network connections. WEP was developed in 1999 and is the oldest of the wireless security standards.
WEP is largely out of use today, but security analysts should still understand WEP in case they encounter it. For example, a network router might have used WEP as the default security protocol and the network administrator never changed it. Or, devices on a network might be too old to support newer Wi-Fi security protocols. Nevertheless, a malicious actor could potentially break the WEP encryption, so it’s now considered a high-risk security protocol.
Wi-Fi Protected Access
Wi-Fi Protected Access (WPA) was developed in 2003 to improve upon WEP, address the security issues that it presented, and replace it. WPA was always intended to be a transitional measure so backwards compatibility could be established with older hardware.
The flaws with WEP were in the protocol itself and how the encryption was used. WPA addressed this weakness by using a protocol called Temporal Key Integrity Protocol (TKIP). WPA encryption algorithm uses larger secret keys than WEPs, making it more difficult to guess the key by trial and error.
WPA also includes a message integrity check that includes a message authentication tag with each transmission. If a malicious actor attempts to alter the transmission in any way or resend at another time, WPA’s message integrity check will identify the attack and reject the transmission.
Despite the security improvements of WPA, it still has vulnerabilities. Malicious actors can use a key reinstallation attack (or KRACK attack) to decrypt transmissions using WPA. Attackers can insert themselves in the WPA authentication handshake process and insert a new encryption key instead of the dynamic one assigned by WPA. If they set the new key to all zeros, it is as if the transmission is not encrypted at all.
Because of this significant vulnerability, WPA was replaced with an updated version of the protocol called WPA2.
WPA2 & WPA3
WPA2
The second version of Wi-Fi Protected Access—known as WPA2—was released in 2004. WPA2 improves upon WPA by using the Advanced Encryption Standard (AES). WPA2 also improves upon WPA’s use of TKIP. WPA2 uses the Counter Mode Cipher Block Chain Message Authentication Code Protocol (CCMP), which provides encapsulation and ensures message authentication and integrity. Because of the strength of WPA2, it is considered the security standard for all Wi-Fi transmissions today. WPA2, like its predecessor, is vulnerable to KRACK attacks. This led to the development of WPA3 in 2018.
Personal
WPA2 personal mode is best suited for home networks for a variety of reasons. It is easy to implement, initial setup takes less time for personal than enterprise version. The global passphrase for WPA2 personal version needs to be applied to each individual computer and access point in a network. This makes it ideal for home networks, but unmanageable for organizations.
Enterprise
WPA2 enterprise mode works best for business applications. It provides the necessary security for wireless networks in business settings. The initial setup is more complicated than WPA2 personal mode, but enterprise mode offers individualized and centralized control over the Wi-Fi access to a business network. This means that network administrators can grant or remove user access to a network at any time. Users never have access to encryption keys, this prevents potential attackers from recovering network keys on individual computers.
WPA3
WPA3 is a secure Wi-Fi protocol and is growing in usage as more WPA3 compatible devices are released. These are the key differences between WPA2 and WPA3:
- WPA3 addresses the authentication handshake vulnerability to KRACK attacks, which is present in WPA2.
- WPA3 uses Simultaneous Authentication of Equals (SAE), a password-authenticated, cipher-key-sharing agreement. This prevents attackers from downloading data from wireless network connections to their systems to attempt to decode it.
- WPA3 has increased encryption to make passwords more secure by using 128-bit encryption, with WPA3-Enterprise mode offering optional 192-bit encryption.
Key takeaways
As a security analyst, knowing the history of how Wi-Fi security protocols developed helps you to better understand what to consider when protecting wireless networks. It’s important that you understand the vulnerabilities of each protocol and how important it is that devices on your network use the most up-to-date security technologies.
Practice Quiz: Test your knowledge: Recognize different network protocols
Fill in the blank: Network protocols are rules used by two or more devices on a network to describe the _ and structure of data.
order of delivery
Network protocols are rules used by two or more devices on a network to describe the order of delivery and the structure of data.
Which network protocol provides a secure method of communication between clients and web servers?
HTTPS
Hypertext transfer protocol secure (HTTPS) provides a secure method of communication between clients and web servers. HTTPS uses digital certificates to perform authentication and can operate over TCP ports 443 and 80.
To keep information safe from malicious actors, what security protocol can be used?
Secure sockets layer and transport layer security (SSL/TLS)
To keep information safe from malicious actors, SSL/TLS can be used. It secures hypertext transfer protocol (HTTP) transactions, which is known as hypertext transfer protocol secure (HTTPS).
IEEE 802.11, also known as Wi-Fi, is a set of standards that define communication for wireless LANs.
True
IEEE 802.11, also known as Wi-Fi, is a set of standards that define communication for wireless LANs.
System identification
Video: Firewalls and network security measures
Firewalls are network security devices that monitor and control incoming and outgoing network traffic. They can be hardware-based, software-based, or cloud-based. Firewalls use a variety of techniques to block malicious traffic, such as port filtering, packet inspection, and intrusion detection.
Stateful firewalls keep track of the state of network connections and use this information to make more informed decisions about whether to allow or block traffic.
Stateless firewalls do not keep track of the state of network connections and rely on predefined rules to make decisions about traffic.
Next-generation firewalls (NGFWs) provide even more security than stateful firewalls by combining stateful inspection with other security features such as deep packet inspection and intrusion prevention.
Proxy servers can be used to add an additional layer of security to a network by acting as an intermediary between clients and servers. Proxy servers can filter traffic, cache content, and hide the IP addresses of clients.
Firewalls and network security measures in Cybersecurity
Firewalls and network security measures are essential components of any cybersecurity strategy. Firewalls help to protect networks from unauthorized access, while network security measures can help to mitigate a wide range of cyber threats, including malware, data breaches, and denial-of-service attacks.
What are firewalls?
A firewall is a network security device that monitors and controls incoming and outgoing network traffic. Firewalls can be hardware-based, software-based, or cloud-based. They use a variety of techniques to block malicious traffic, such as port filtering, packet inspection, and intrusion detection.
Different types of firewalls
- Hardware firewalls: Hardware firewalls are physical devices that sit between a network and the internet. They inspect all incoming and outgoing traffic and block any traffic that does not meet the firewall’s rules.
- Software firewalls: Software firewalls are programs that are installed on individual computers or servers. They work in the same way as hardware firewalls, but they are less expensive and easier to deploy.
- Cloud-based firewalls: Cloud-based firewalls are hosted by a third-party provider and can be accessed through a web interface. They are a good option for organizations that do not have the resources to manage their own firewalls.
How do firewalls work?
Firewalls work by inspecting each packet of data that passes through them. They compare the packet against a set of rules to determine whether to allow or block it. Firewall rules can be based on a variety of factors, such as the source and destination IP addresses, the port numbers, and the type of traffic.
Benefits of using firewalls
Firewalls offer a number of benefits, including:
- Protection from unauthorized access: Firewalls can help to protect networks from unauthorized access by blocking traffic from unknown sources.
- Malware prevention: Firewalls can help to prevent malware infections by blocking traffic from known malicious websites and IP addresses.
- Data breach prevention: Firewalls can help to prevent data breaches by blocking traffic that attempts to exfiltrate sensitive data from the network.
- Denial-of-service attack protection: Firewalls can help to protect networks from denial-of-service attacks by blocking large volumes of unwanted traffic.
Network security measures
In addition to firewalls, there are a number of other network security measures thatorganizations can implement to protect their networks from cyber threats. These measures include:
- Intrusion detection systems (IDS): IDS monitor network traffic for suspicious activity and alert administrators to potential threats.
- Intrusion prevention systems (IPS): IPS work like IDS, but they can also take action to block malicious traffic.
- Content filtering: Content filtering can be used to block access to malicious websites and other harmful content.
- VPNs: VPNs encrypt network traffic, making it more difficult for attackers to intercept and eavesdrop on communications.
- Network segmentation: Network segmentation can be used to divide a network into smaller segments, making it more difficult for attackers to move laterally through the network if they breach one segment.
Best practices for network security
Here are some best practices for network security:
- Keep your software up to date: Software updates often include security patches that can help to protect your systems from known vulnerabilities.
- Use strong passwords and multi-factor authentication: Strong passwords and multi-factor authentication can help to prevent unauthorized access to your systems and accounts.
- Educate your employees about cybersecurity: Employees are often the weakest link in the cybersecurity chain. It is important to educate them about cyber threats and how to protect themselves and the organization.
- Implement a layered security approach: A layered security approach involves using multiple security measures to protect your network. This helps to mitigate the risk of a successful attack.
By following these best practices, organizations can help to protect their networks from cyber threats and keep their data safe.
Which class of firewall operates based on predefined rules and does not keep track of information from data packets?
Stateless
Stateless firewalls are a class of firewall that operates based on predefined rules and does not keep track of information from data packets.
In this video, you’ll learn about different
types of firewalls. These include hardware, software, and
cloud-based firewalls. You’ll also learn the
difference between a stateless and
stateful firewall and cover some of the
basic operations that a firewall performs. Finally, you will explore how proxy servers are used to add a layer of security
to the network. A firewall is a network
security device that monitors traffic to
and from your network. It either allows
traffic or it blocks it based on a defined
set of security rules. A firewall can use
port filtering, which blocks or allows certain port numbers to limit
unwanted communication. For example, it could have a rule that only allows
communications on port 443 for HTTPS or port 25 for email and blocks
everything else. These firewall settings
will be determined by the organization’s
security policy. Let’s talk about a few
different kinds of firewalls. A hardware firewall is
considered the most basic way to defend against
threats to a network. A hardware firewall inspects each data packet before it’s allowed to enter the network. A software firewall performs the same functions as
a hardware firewall, but it’s not a physical device. Instead, it’s a software program installed on a computer
or on a server. If the software firewall is
installed on a computer, it will analyze all the traffic received by that computer. If the software firewall
is installed on a server, it will protect all the devices
connected to the server. A software firewall
typically costs less than purchasing a
separate physical device, and it doesn’t take
up any extra space. But because it is a
software program, it will add some
processing burden to the individual devices. Organizations may choose to
use a cloud-based firewall. Cloud service providers
offer firewalls as a service, or FaaS,
for organizations. Cloud-based firewalls
are software firewalls hosted by a cloud
service provider. Organizations can configure
the firewall rules on the cloud service
provider’s interface, and the firewall will perform
security operations on all incoming traffic before it reaches the organization’s onsite network. Cloud-based firewalls also
protect any assets or processes that an organization might be using in the cloud. All the firewalls we
have discussed can be either stateful or stateless. The terms “stateful” and “stateless” refer to how the
firewall operates. Stateful refers to a class of firewall that keeps track of information passing through it and proactively
filters out threats. A stateful firewall analyzes network traffic for
characteristics and behavior that appear suspicious and stops them from
entering the network. Stateless refers to a class of firewall that
operates based on predefined rules and does not keep track of information
from data packets. A stateless firewall
only acts according to preconfigured rules set by
the firewall administrator. The rules programmed by the
firewall administrator tell the device what to accept
and what to reject. A stateless firewall doesn’t
store analyzed information. It also doesn’t discover suspicious trends like a
stateful firewall does. For this reason, stateless
firewalls are considered less secure than
stateful firewalls. A next generation
firewall, or NGFW, provides even more security
than a stateful firewall. Not only does an NGFW provide stateful inspection of
incoming and outgoing traffic, but it also performs more in-depth security functions like deep packet inspection
and intrusion protection. Some NGFWs connect to cloud-based threat
intelligence services so they can quickly update to protect against
emerging cyber threats. Now you have a
basic understanding of firewalls and how they work. We learned that firewalls
can be hardware or software. We also discussed the
difference between a stateless and
stateful firewall and the security benefits
of a stateful firewall. Finally, we discussed
next generation firewalls and the security
benefits they provide. Coming up, we’ll learn more
about virtual networks.
Video: Virtual private networks (VPNs)
A virtual private network (VPN) adds security to your network by changing your public IP address, hiding your virtual location, encrypting your data, and encapsulating your data in transit.
- Changing your public IP address: This makes it more difficult for attackers to track your online activity.
- Hiding your virtual location: This helps to protect your privacy and makes it more difficult for attackers to target you with location-based attacks.
- Encrypting your data: This makes it unreadable to anyone who intercepts it.
- Encapsulating your data in transit: This allows your network requests to reach their destination while still encrypting your personal data.
VPNs are a simple and effective way to add security to your network. They are especially useful when using public Wi-Fi networks, as they can help to protect your data from being intercepted by attackers.
Virtual private networks (VPNs) in Cybersecurity
A virtual private network (VPN) is a network security service that encrypts your internet traffic and routes it through a server in another location. This makes it appear as if you are connecting to the internet from that location, even though you are actually connecting from your current location.
How VPNs work
When you connect to a VPN, your device creates an encrypted tunnel between itself and the VPN server. All of your internet traffic is then routed through this tunnel, which makes it unreadable to anyone who intercepts it.
VPNs use a variety of encryption protocols, such as OpenVPN and IKEv2. These protocols are very secure and make it very difficult for attackers to break into your VPN connection.
Benefits of using a VPN
VPNs offer a number of benefits, including:
- Security: VPNs encrypt your internet traffic, making it unreadable to anyone who intercepts it. This is especially important when using public Wi-Fi networks, as these networks are often unsecured.
- Privacy: VPNs hide your IP address and make it appear as if you are connecting to the internet from another location. This can help to protect your privacy and make it more difficult for advertisers and other third parties to track your online activity.
- Bypassing geo-restrictions: VPNs can be used to bypass geo-restrictions. This means that you can access content that is only available in certain countries, such as Netflix and Hulu.
Choosing a VPN
When choosing a VPN, it is important to consider the following factors:
- Encryption protocol: Choose a VPN that uses a strong encryption protocol, such as OpenVPN or IKEv2.
- Server network: Choose a VPN with a large server network, so that you can connect to a server in a location that is convenient for you.
- Logging policy: Choose a VPN that does not log your internet activity. This will help to protect your privacy.
How to use a VPN
To use a VPN, you will need to download and install a VPN client on your device. Once you have installed the VPN client, you can create an account and connect to a VPN server.
Once you are connected to a VPN server, all of your internet traffic will be routed through the VPN tunnel. This means that your IP address will be hidden and your internet traffic will be encrypted.
VPNs in cybersecurity
VPNs can be used to improve cybersecurity in a number of ways. For example, VPNs can be used to:
- Protect remote workers: VPNs can be used to protect remote workers who are connecting to the company network from public Wi-Fi networks.
- Prevent data breaches: VPNs can be used to prevent data breaches by encrypting all data that is transmitted between the company network and remote devices.
- Block malicious traffic: VPNs can be used to block malicious traffic from entering the company network.
Conclusion
VPNs are a valuable tool for improving cybersecurity. By encrypting your internet traffic and hiding your IP address, VPNs can help to protect you from a variety of online threats.
Here are some tips for using VPNs in cybersecurity:
- Use a VPN whenever you are using a public Wi-Fi network.
- Choose a VPN that uses a strong encryption protocol, such as OpenVPN or IKEv2.
- Make sure to keep your VPN client up to date.
- Be careful about what information you share online when using a VPN. Even though your internet traffic is encrypted, it is still possible for attackers to track your online activity if you share your personal information.
By following these tips, you can use VPNs to improve your cybersecurity and protect your privacy online.
Fill in the blank: ____ is a process performed by a VPN service that protects data in transit by wrapping sensitive data in other data packets.
Encapsulation
A VPN service performs encapsulation to protect data in transit. Encapsulation protects data by wrapping it in other data packets.
In this video, we’re going to discuss how virtual
private networks, or VPNs, add security
to your network. When you connect
to the internet, your internet service
provider receives your network’s requests and forwards it to the correct
destination server. But your internet requests include your private
information. That means if the traffic
gets intercepted, someone could potentially
connect your internet activity with your physical location and your personal information. This includes some information that you want to keep private, like bank accounts and
credit card numbers. A virtual private network, also known as a VPN, is a network security
service that changes your public IP address and hides your virtual location so
that you can keep your data private when you’re
using a public network like the internet. VPNs also encrypt
your data as it travels across the internet
to preserve confidentiality. A VPN service performs encapsulation on your
data in transit. Encapsulation is a
process performed by a VPN service that protects your data by wrapping sensitive data in
other data packets. Previously, you learned how
the MAC and IP address of the destination
device is contained in the header and footer
of a data packet. This is a security
threat because it shows the IP and virtual location
of your private network. You could secure a data
packet by encrypting it to make sure your information
can’t be deciphered, but then network routers
won’t be able to read the IP and MAC address to
know where to send it to. This means you won’t
be able to connect to the internet site or the
service that you want. Encapsulation
solves this problem while still maintaining
your privacy. VPN services encrypt
your data packets and encapsulate them in
other data packets that the routers can read. This allows your
network requests to reach their destination, but still encrypts
your personal data so it’s unreadable
while in transit. A VPN also uses an
encrypted tunnel between your device
and the VPN server. The encryption is unhackable
without a cryptographic key, so no one can access your data. VPN services are
simple and offer significant protection while
you’re on the internet. With a VPN, you have the added assurance
that your data is encrypted, and your IP address and virtual location are unreadable
to malicious actors.
Video: Security zones
Security zones are a network security feature that segments a network into different zones, each with its own access permissions and security rules. This helps to protect the internal network from unauthorized access and malicious attacks.
Types of security zones:
- Uncontrolled zone: Any network outside of the organization’s control, such as the internet.
- Controlled zone: A subnet that protects the internal network from the uncontrolled zone.
- Demilitarized zone (DMZ): A public-facing network that contains services that can access the internet, such as web servers, proxy servers, and DNS servers.
- Internal network: A private network that contains the organization’s critical data and servers.
- Restricted zone: A highly secure network that contains the organization’s most confidential information.
Benefits of using security zones:
- Protect the internal network from unauthorized access and malicious attacks.
- Maintain privacy within different corporate groups.
- Prevent issues from spreading to the whole network.
Example:
A hotel may have a free public Wi-Fi network that is separate from the encrypted network used by the hotel staff. This helps to protect the hotel’s internal network from unauthorized access.
Another example:
A university may have a faculty subnet and a separate student subnet. If there is a virus outbreak on the student subnet, network administrators can isolate it and keep the rest of the network safe.
How security zones are used:
Security zones are typically used in conjunction with firewalls to control traffic between different zones. For example, a firewall may be used to block all traffic from the uncontrolled zone to the internal network, except for traffic that is specifically allowed.
Security zones for security analysts:
Security analysts may be responsible for managing access control policies on firewalls that protect security zones. This includes restricting IPs and ports to control traffic to the DMZ and internal network.
Conclusion:
Security zones are an important part of securing networks, especially in large organizations. By segmenting the network into different zones with different security rules, organizations can help to protect their internal networks from unauthorized access and malicious attacks.
Here is a diagram that illustrates how security zones are typically used in a network:
The DMZ is located between two firewalls, one that filters traffic outside the DMZ and one that filters traffic entering the internal network. This provides multiple layers of defense for the internal network.
The restricted zone is located inside the internal network and is protected by another firewall. This further protects highly confidential information from unauthorized access.
Security zones in Cybersecurity
Security zones are a network security feature that segments a network into different zones, each with its own access permissions and security rules. This helps to protect the internal network from unauthorized access and malicious attacks.
Benefits of using security zones:
- Improved security: Security zones can help to improve security by isolating different parts of the network from each other. This makes it more difficult for attackers to move laterally through the network if they breach one zone.
- Enhanced privacy: Security zones can also help to enhance privacy by keeping sensitive data in a separate zone from the rest of the network. This makes it more difficult for unauthorized users to access sensitive data.
- Increased compliance: Security zones can also help organizations to comply with various regulations, such as the General Data Protection Regulation (GDPR).
Types of security zones:
There are many different ways to segment a network into security zones. Some common types of security zones include:
- Demilitarized zone (DMZ): A DMZ is a public-facing network that contains services that need to be accessible from the internet, such as web servers, mail servers, and DNS servers. The DMZ is typically isolated from the rest of the network by firewalls.
- Internal network: The internal network is a private network that contains the organization’s critical data and servers. The internal network is typically protected from the internet by firewalls.
- Restricted zone: A restricted zone is a highly secure network that contains the organization’s most confidential information. The restricted zone is typically isolated from the rest of the network by firewalls and other security controls.
Designing security zones:
When designing security zones, it is important to consider the following factors:
- The organization’s security requirements: The organization’s security requirements will determine the number and type of security zones that are needed.
- The network architecture: The network architecture will also affect the design of the security zones.
- The organization’s budget: The organization’s budget will also need to be considered when designing security zones.
Implementing security zones:
There are a number of different ways to implement security zones. One common way is to use firewalls to isolate the different zones from each other. Another way to implement security zones is to use VLANs (virtual local area networks). VLANs allow you to create multiple logical networks on a single physical network.
Best practices for security zones:
Here are some best practices for security zones:
- Implement multiple layers of defense: Don’t rely on just one security control to protect your security zones. Use multiple layers of defense, such as firewalls, VLANs, and intrusion detection systems.
- Keep your security zones up to date: Regularly review and update your security zones to make sure that they meet your organization’s security requirements.
- Educate your employees: Educate your employees about the importance of security zones and how to use them properly.
Conclusion
Security zones are an important part of any cybersecurity strategy. By segmenting your network into security zones, you can help to improve security, enhance privacy, and increase compliance.
Which of the following areas are in the controlled zone? Select all that apply.
Demilitarized zone (DMZ)
The DMZ, internal network, and restricted zones are all within the controlled zone. The DMZ contains public-facing services that can access the internet.
Restricted zone
The DMZ, internal network, and restricted zones are all within the controlled zone. The restricted zone protects highly confidential information that is only accessible to employees with certain privileges.
Internal network
The DMZ, internal network, and restricted zones are all within the controlled zone. The internal network contains private servers and data that the organization needs to protect.
In this section, we’ll
discuss a type of network security feature
called a security zone. Security zones are a
segment of a network that protects the internal
network from the internet. They are a part of a
security technique called network segmentation that divides the network
into segments. Each network segment has its own access permissions
and security rules. Security zones control who can access different
segments of a network. Security zones act as a
barrier to internal networks, maintain privacy within
corporate groups, and prevent issues from
spreading to the whole network. One example of network
segmentation is a hotel that offers
free public Wi-Fi. The unsecured guest network
is kept separate from another encrypted network
used by the hotel staff. Additionally, an organization’s network can be divided into subnetworks, or subnets, to maintain privacy for each
department in a organization. For instance, at a university, there may be a faculty subnet and a separate students subnet. If there is contamination
on the student’s subnet, network administrators
can isolate it and keep the rest of the network
free from contamination. An organization’s network
is classified into two types of security
zones. First, there’s the uncontrolled zone, which is any network outside of the organization’s control,
like the internet. Then, there’s the
controlled zone, which is a subnet that protects the internal network from
the uncontrolled zone. There are several types of networks within the
controlled zone. On the outer layer is
the demilitarized zone, or DMZ, which contains public-facing services that
can access the internet. This includes web servers, proxy servers that host
websites for the public, and DNS servers that provide IP addresses for internet users. It also includes email and file servers that handle
external communications. The DMZ acts as a network perimeter to
the internal network. The internal network
contains private servers and data that the organization
needs to protect. Inside the internal network is another zone called
the restricted zone. The restricted zone protects highly confidential
information that is only accessible to employees
with certain privileges. Now, let’s try to picture
these security zones. Ideally, the DMZ is
situated between two firewalls. One of them filters traffic outside the DMZ, and one of them filters traffic entering the internal network. This protects the
internal network with several lines of defense. If there’s a restricted zone, that too would be protected with another firewall. This way, attacks that penetrate into the DMZ network cannot spread
to the internal network, and attacks that penetrate the internal network cannot
access the restricted zone. As a security analyst, you may be responsible
for regulating access control policies
on these firewalls. Security teams can
control traffic reaching the DMZ and the internal network by restricting IPs and ports. For example, an analyst
may ensure that only HTTPS traffic is allowed to access web
servers in the DMZ. Security zones are an important part of
securing networks, especially in large
organizations. Understanding how
they are used is essential for all
security analysts. Coming up, we’ll learn about
securing internal networks.
Reading: Subnetting and CIDR
Reading
Earlier in this course, you learned about network segmentation, a security technique that divides networks into sections. A private network can be segmented to protect portions of the network from the internet, which is an unsecured global network.
For example, you learned about the uncontrolled zone, the controlled zone, the demilitarized zone, and the restricted zone. Feel free to review the video about security zones for a refresher on how network segmentation can be used to add a layer of security to your organization’s network operations. Creating security zones is one example of a networking strategy called subnetting.
Overview of subnetting
Subnetting is the subdivision of a network into logical groups called subnets. It works like a network inside a network. Subnetting divides up a network address range into smaller subnets within the network. These smaller subnets form based on the IP addresses and network mask of the devices on the network. Subnetting creates a network of devices to function as their own network. This makes the network more efficient and can also be used to create security zones. If devices on the same subnet communicate with each other, the switch changes the transmissions to stay on the same
Classless Inter-Domain Routing notation for subnetting
Classless Inter-Domain Routing (CIDR) is a method of assigning subnet masks to IP addresses to create a subnet. Classless addressing replaces classful addressing. Classful addressing was used in the 1980s as a system of grouping IP addresses into classes (Class A to Class E). Each class included a limited number of IP addresses, which were depleted as the number of devices connecting to the internet outgrew the classful range in the 1990s. Classless CIDR addressing expanded the number of available IPv4 addresses.
CIDR allows cybersecurity professionals to segment classful networks into smaller chunks. CIDR IP addresses are formatted like IPv4 addresses, but they include a slash (“/’”) followed by a number at the end of the address, This extra number is called the IP network prefix. For example, a regular IPv4 address uses the 198.51.100.0 format, whereas a CIDR IP address would include the IP network prefix at the end of the address, 198.51.100.0/24. This CIDR address encompasses all IP addresses between 198.51.100.0 and 198.51.100.255. The system of CIDR addressing reduces the number of entries in routing tables and provides more available IP addresses within networks. You can try converting CIDR to IPv4 addresses and vice versa through an online conversion tool, like IPAddressGuide, for practice and to better understand this concept.
Note: You may learn more about CIDR during your career, but it won’t be covered in any additional depth in this certificate program. For now, you only need a basic understanding of this concept.
Security benefits of subnetting
Subnetting allows network professionals and analysts to create a network within their own network without requesting another network IP address from their internet service provider. This process uses network bandwidth more efficiently and improves network performance. Subnetting is one component of creating isolated subnetworks through physical isolation, routing configuration, and firewalls.
Key takeaways
Subnetting is a common security strategy used by organizations. Subnetting allows organizations to create smaller networks within their private network. This improves the efficiency of the network and can be used to create security zones.
Video: Proxy servers
Proxy servers are a security tool that helps to secure internal networks. They sit between the internet and the rest of the network, and they filter incoming and outgoing traffic. Proxy servers can be used to block unsafe websites, hide the private network’s IP address, and filter spam email.
There are three main types of proxy servers:
- Forward proxy servers regulate and restrict access to the internet by hiding the user’s IP address and approving all outgoing requests.
- Reverse proxy servers regulate and restrict internet access to an internal server by accepting traffic from external parties, approving it, and forwarding it to the internal servers.
- Email proxy servers filter spam email by verifying whether a sender’s address was forged.
Proxy servers play an important role in network security by adding a layer of protection from the unsecured public internet.
What is a proxy server?
A proxy server is a server that acts as an intermediary between a client and the internet. It intercepts all incoming and outgoing requests from the client and forwards them to the appropriate servers. The proxy server can also modify the requests or responses before they are forwarded.
How do proxy servers work?
When a client wants to access a website, it sends a request to the proxy server. The proxy server then forwards the request to the web server. The web server sends the response back to the proxy server, which then forwards it to the client.
Benefits of using proxy servers in cybersecurity
Proxy servers can provide a number of benefits for cybersecurity, including:
- Improved security: Proxy servers can hide the client’s IP address from the internet, which can help to protect the client from cyberattacks.
- Content filtering: Proxy servers can be used to filter content, such as blocking access to malicious websites or websites that are not relevant to the organization.
- Caching: Proxy servers can cache frequently accessed websites, which can improve performance and reduce bandwidth usage.
- Load balancing: Proxy servers can be used to distribute traffic across multiple servers, which can improve performance and reliability.
Types of proxy servers
There are two main types of proxy servers:
- Transparent proxy servers: Transparent proxy servers do not modify the requests or responses that they forward.
- Non-transparent proxy servers: Non-transparent proxy servers modify the requests or responses that they forward. This can be done to hide the client’s IP address, filter content, or cache frequently accessed websites.
How to use proxy servers in cybersecurity
Proxy servers can be used in a variety of ways to improve cybersecurity. Here are a few examples:
- Blocking malicious websites: Proxy servers can be used to block access to malicious websites, such as websites that are known to distribute malware or phishing attacks.
- Protecting internal networks: Proxy servers can be used to protect internal networks from cyberattacks by hiding the IP addresses of internal servers.
- Monitoring network traffic: Proxy servers can be used to monitor network traffic for suspicious activity.
- Enforcing policies: Proxy servers can be used to enforce policies, such as blocking access to certain websites or limiting bandwidth usage.
Best practices for using proxy servers in cybersecurity
Here are some best practices for using proxy servers in cybersecurity:
- Use a reputable proxy server provider: Choose a proxy server provider that has a good reputation and offers security features such as encryption and IP filtering.
- Keep your proxy server software up to date: Make sure to keep your proxy server software up to date with the latest security patches.
- Configure your proxy server correctly: Configure your proxy server correctly to ensure that it is providing the desired security features.
- Monitor your proxy server: Monitor your proxy server for suspicious activity and make sure that it is performing as expected.
Proxy servers can be a valuable tool for improving cybersecurity. By following the best practices above, you can use proxy servers to protect your organization from cyberattacks.
Fill in the blank: A(n) _____ regulates and restricts the internet’s access to an internal server.
reverse proxy server
A reverse proxy server regulates and restricts the internet’s access to an internal server.
Previously, we discussed how firewalls,
VPNs, and security zones help to secure networks. Next, we’ll cover how to secure
internal networks with proxy servers. Proxy servers are another system
that helps secure networks. The definition of a proxy server is
a server that fulfills the request of a client by forwarding
them on to other servers. The proxy server is a dedicated server
that sits between the internet and the rest of the network. When a request to connect to
the network comes in from the internet, the proxy server will determine if
the connection request is safe. The proxy server is a public IP address
that is different from the rest of the private network. This hides the private network’s IP address
from malicious actors on the internet and adds a layer of security. Let’s examine how this
will work with an example. When a client receives an HTTPS response,
they will notice a distorted IP address or no IP address rather than the real IP
address of the organization’s web server. A proxy server can also be used to block
unsafe websites that users aren’t allowed to access on an organization’s network. A proxy server uses temporary
memory to store data that’s regularly requested by external servers. This way, it doesn’t have to fetch
data from an organization’s internal servers every time. This enhances security by reducing
contact with the internal server. There are different types of proxy
servers that support network security. This is important for
security analysts who monitor traffic from various proxy servers and
may need to know what purpose they serve. Let’s explore some different
types of proxy servers. A forward proxy server regulates and restricts a person with
access to the internet. The goal is to hide a user’s IP address
and approve all outgoing requests. In the context of an organization, a forward proxy server receives outgoing
traffic from an employee, approves it, and then forwards it on to
the destination on the internet. A reverse proxy server regulates and restricts the internet access
to an internal server. The goal is to accept traffic from
external parties, approve it, and forward it to the internal servers. This setup is useful for
protecting internal web servers containing confidential data from exposing their
IP address to external parties. An email proxy server is
another valuable security tool. It filters spam email by verifying
whether a sender’s address was forged. This reduces the risk of phishing
attacks that impersonate people known to the organization. Let’s talk about a real world
example of an email proxy. Several years ago when I was working
at a large U.S. broadband ISP, we used a proxy server to implement
multiple layers of anti-spam filtering before a message was allowed in for
delivery. It ended up tagging around
95% of messages as spam. The proxy servers would’ve
allowed us to filter and then scale those filters without
impacting the underlying email platform. Proxy servers play an important part in
network security by filtering incoming and outgoing traffic and
staying alert to network attacks. These devices add a layer of protection
from the unsecured public network that we call the internet.
Reading: Virtual networks and privacy
Reading
This section of the course covered a lot of information about network operations. You reviewed the fundamentals of network architecture and communication and can now use this knowledge as you learn how to secure networks. Securing a private network requires maintaining the confidentiality of your data and restricting access to authorized users.
In this reading, you will review several network security topics previously covered in the course, including virtual private networks (VPNs), proxy servers, firewalls, and security zones. You’ll continue to learn more about these concepts and how they relate to each other as you continue through the course.
Common network protocols
Network protocols are used to direct traffic to the correct device and service depending on the kind of communication being performed by the devices on the network. Protocols are the rules used by all network devices that provide a mutually agreed upon foundation for how to transfer data across a network.
There are three main categories of network protocols: communication protocols, management protocols, and security protocols.
- Communication protocols are used to establish connections between servers. Examples include TCP, UDP, and Simple Mail Transfer Protocol (SMTP), which provides a framework for email communication.
- Management protocols are used to troubleshoot network issues. One example is the Internet Control Message Protocol (ICMP).
- Security protocols provide encryption for data in transit. Examples include IPSec and SSL/TLS.
Some other commonly used protocols are:
- HyperText Transfer Protocol (HTTP). HTTP is an application layer communication protocol. This allows the browser and the web server to communicate with one another.
- Domain Name System (DNS). DNS is an application layer protocol that translates, or maps, host names to IP addresses.
- Address Resolution Protocol (ARP). ARP is a network layer communication protocol that maps IP addresses to physical machines or a MAC address recognized on the local area network.
Wi-Fi
This section of the course also introduced various wireless security protocols, including WEP, WPA, WPA2, and WPA3. WPA3 encrypts traffic with the Advanced Encryption Standard (AES) cipher as it travels from your device to the wireless access point. WPA2 and WPA3 offer two modes: personal and enterprise. Personal mode is best suited for home networks while enterprise mode is generally utilized for business networks and applications.
Network security tools and practices
Firewalls
Previously, you learned that firewalls are network virtual appliances (NVAs) or hardware devices that inspect and can filter network traffic before it’s permitted to enter the private network. Traditional firewalls are configured with rules that tell it what types of data packets are allowed based on the port number and IP address of the data packet.
There are two main categories of firewalls.
- Stateless: A class of firewall that operates based on predefined rules and does not keep track of information from data packets
- Stateful: A class of firewall that keeps track of information passing through it and proactively filters out threats. Unlike stateless firewalls, which require rules to be configured in two directions, a stateful firewall only requires a rule in one direction. This is because it uses a “state table” to track connections, so it can match return traffic to an existing session
Next generation firewalls (NGFWs) are the most technologically advanced firewall protection. They exceed the security offered by stateful firewalls because they include deep packet inspection (a kind of packet sniffing that examines data packets and takes actions if threats exist) and intrusion prevention features that detect security threats and notify firewall administrators. NGFWs can inspect traffic at the application layer of the TCP/IP model and are typically application aware. Unlike traditional firewalls that block traffic based on IP address and ports, NGFWs rules can be configured to block or allow traffic based on the application. Some NGFWs have additional features like Malware Sandboxing, Network Anti-Virus, and URL and DNS Filtering.
Proxy servers
A proxy server is another way to add security to your private network. Proxy servers utilize network address translation (NAT) to serve as a barrier between clients on the network and external threats. Forward proxies handle queries from internal clients when they access resources external to the network. Reverse proxies function opposite of forward proxies; they handle requests from external systems to services on the internal network. Some proxy servers can also be configured with rules, like a firewall. For example, you can create filters to block websites identified as containing malware.
Virtual Private Networks (VPN)
A VPN is a service that encrypts data in transit and disguises your IP address. VPNs use a process called encapsulation. Encapsulation wraps your encrypted data in an unencrypted data packet, which allows your data to be sent across the public network while remaining anonymous. Enterprises and other organizations use VPNs to help protect communications from users’ devices to corporate resources. Some of these resources include servers or virtual machines that host business applications. Individuals also use VPNs to increase personal privacy. VPNs protect user privacy by concealing personal information, including IP addresses, from external servers. A reputable VPN also minimizes its own access to user internet activity by using strong encryption and other security measures. Organizations are increasingly using a combination of VPN and SD-WAN capabilities to secure their networks. A software-defined wide area network (SD-WAN) is a virtual WAN service that allows organizations to securely connect users to applications across multiple locations and over large geographical distances.
Key takeaways
There are three main categories of network protocols: communication, management, and security protocols. In this reading, you learned the fundamentals of firewalls, proxy servers, and VPNs. More organizations are implementing a cloud-based approach to network security by incorporating a combination of VPN and SD-WAN capabilities as a service.
Reading: VPN protocols: Wireguard and IPSec
Reading
A VPN, or virtual private network, is a network security service that changes your public IP address and hides your virtual location so that you can keep your data private when you’re using a public network like the internet. VPNs provide a server that acts as a gateway between a computer and the internet. This server creates a path similar to a virtual tunnel that hides the computer’s IP address and encrypts the data in transit to the internet. The main purpose of a VPN is to create a secure connection between a computer and a network. Additionally, a VPN allows trusted connections to be established on non-trusted networks. VPN protocols determine how the secure network tunnel is formed. Different VPN providers provide different VPN protocols.
This reading will cover the differences between remote access and site-to-site VPNs, and two VPN protocols: WireGuard VPN and IPSec VPN. A VPN protocol is similar to a network protocol: It’s a set of rules or instructions that will determine how data moves between endpoints. An endpoint is any device connected on a network. Some examples of endpoints include computers, mobile devices, and servers.
Remote access and site-to-site VPNs
Individual users use remote access VPNs to establish a connection between a personal device and a VPN server. Remote access VPNs encrypt data sent or received through a personal device. The connection between the user and the remote access VPN is established through the internet.
Enterprises use site-to-site VPNs largely to extend their network to other networks and locations. This is particularly useful for organizations that have many offices across the globe. IPSec is commonly used in site-to-site VPNs to create an encrypted tunnel between the primary network and the remote network. One disadvantage of site-to-site VPNs is how complex they can be to configure and manage compared to remote VPNs.
WireGuard VPN vs. IPSec VPN
WireGuard and IPSec are two different VPN protocols used to encrypt traffic over a secure network tunnel. The majority of VPN providers offer a variety of options for VPN protocols, such as WireGuard or IPSec. Ultimately, choosing between IPSec and WireGuard depends on many factors, including connection speeds, compatibility with existing network infrastructure, and business or individual needs.
WireGuard VPN
WireGuard is a high-speed VPN protocol, with advanced encryption, to protect users when they are accessing the internet. It’s designed to be simple to set up and maintain. WireGuard can be used for both site-to-site connection and client-server connections. WireGuard is relatively newer than IPSec, and is used by many people due to the fact that its download speed is enhanced by using fewer lines of code. WireGuard is also open source, which makes it easier for users to deploy and debug. This protocol is useful for processes that require faster download speeds, such as streaming video content or downloading large files.
IPSec VPN
IPSec is another VPN protocol that may be used to set up VPNs. Most VPN providers use IPSec to encrypt and authenticate data packets in order to establish secure, encrypted connections. Since IPSec is one of the earlier VPN protocols, many operating systems support IPSec from VPN providers.
Although IPSec and WireGuard are both VPN protocols, IPSec is older and more complex than WireGuard. Some clients may prefer IPSec due to its longer history of use, extensive security testing, and widespread adoption. However, others may prefer WireGuard because of its potential for better performance and simpler configuration.
Key Takeaways
A VPN protocol is similar to a network protocol: It’s a set of rules or instructions that will determine how data moves between endpoints. There are two types of VPNs: remote access and site-to-site. Remote access VPNs establish a connection between a personal device and a VPN server and encrypt or decrypt data exchanged with a personal device. Enterprises use site-to-site VPNs largely to extend their network to different locations and networks. IPSec can be used to create site-to-site connections and WireGuard can be used for both site-to-site and remote access connections.
Practice Quiz: Test your knowledge: System identification
What monitors and filters traffic coming in and out of a network?
Firewall
A firewall monitors and filters traffic coming in and out of a network. It either allows or denies traffic based on a defined set of security rules.
Stateless is a class of firewall that keeps track of information passing through it and proactively filters out threats.
False
Stateful is a class of firewall that keeps track of information passing through it and proactively filters out threats. Stateless operates based on predefined rules and does not keep track of information from data packets.
Fill in the blank: Encapsulation can be performed by a _ to help protect information by wrapping sensitive data in other data packets.
VPN service
Encapsulation can be performed by a VPN service to help protect information by wrapping sensitive data in other data packets. VPNs change a public IP address and hide a virtual location to keep data private when using a public network.
Which security zone is used to ensure highly confidential information and is only accessible to employees with certain privileges?
Restricted zone
The restricted zone protects highly confidential information that only people with certain privileges can access. It typically has a separate firewall.
Fill in the blank: A security analyst uses a _ to regulate and restrict access to an internal server from the internet. This tool works by accepting traffic from external parties, approving it, and forwarding it to internal servers.
reverse proxy server
A security analyst uses a reverse proxy server to regulate and restrict access to an internal server from the internet. This tool works by accepting traffic from external parties, approving it, and forwarding it to internal servers.
Review: Network operations
Video: Wrap-up
Recap of the section on network operations:
- Network protocols: TCP, ARP, HTTPS, and DNS are common network protocols that help devices communicate over a network.
- Virtual private networks (VPNs): VPNs can be used to encrypt traffic and hide IP addresses, maintaining privacy on a public network.
- Firewalls, security zones, and proxy servers: Firewalls, security zones, and proxy servers help to secure network infrastructure by filtering traffic and preventing unauthorized access.
Network operations is a vast topic involving various tools, protocols, and techniques that help networks run smoothly and securely. This information is essential for any security analyst, regardless of their specific role.
You’ve learned a lot about
some complex topics. I want to congratulate you for
coming this far in the program. Let’s recap what we’ve
covered in this section. First, we discussed common network
protocols like TCP, ARP, HTTPS, and DNS. And then we covered how
virtual private networks, or VPNs, can be used to maintain
privacy on a public network. Finally, we explored how firewalls,
security zones, and proxy servers help to secure
network infrastructure. Overall, network operations is a vast
topic involving various tools, protocols, and techniques that help
networks run smoothly and securely. Feel free to come back and
review these videos at any time. You’ll use this information in any
type of role as a security analyst.
Reading: Glossary terms from module 2
Terms and definitions from Course 3, Module 2
Address Resolution Protocol (ARP): A network protocol used to determine the MAC address of the next router or device on the path
Cloud-based firewalls: Software firewalls that are hosted by the cloud service provider
Controlled zone: A subnet that protects the internal network from the uncontrolled zone
Domain Name System (DNS): A networking protocol that translates internet domain names into IP addresses
Encapsulation: A process performed by a VPN service that protects your data by wrapping sensitive data in other data packets
Firewall: A network security device that monitors traffic to or from your network
Forward proxy server: A server that regulates and restricts a person’s access to the internet
Hypertext Transfer Protocol (HTTP): An application layer protocol that provides a method of communication between clients and website servers
Hypertext Transfer Protocol Secure (HTTPS): A network protocol that provides a secure method of communication between clients and servers
IEEE 802.11 (Wi-Fi): A set of standards that define communication for wireless LANs
Network protocols: A set of rules used by two or more devices on a network to describe the order of delivery of data and the structure of data
Network segmentation: A security technique that divides the network into segments
Port filtering: A firewall function that blocks or allows certain port numbers to limit unwanted communication
Proxy server: A server that fulfills the requests of its clients by forwarding them to other servers
Reverse proxy server: A server that regulates and restricts the internet’s access to an internal server
Secure File Transfer Protocol (SFTP): A secure protocol used to transfer files from one device to another over a network
Secure shell (SSH): A security protocol used to create a shell with a remote system
Security zone: A segment of a company’s network that protects the internal network from the internet
Simple Network Management Protocol (SNMP): A network protocol used for monitoring and managing devices on a network
Stateful: A class of firewall that keeps track of information passing through it and proactively filters out threats
Stateless: A class of firewall that operates based on predefined rules and does not keep track of information from data packets
Subnetting: The subdivision of a network into logical groups called subnets
Transmission Control Protocol (TCP): An internet communication protocol that allows two devices to form a connection and stream data
Uncontrolled zone: The portion of the network outside the organization
Virtual private network (VPN): A network security service that changes your public IP address and masks your virtual location so that you can keep your data private when you are using a public network like the internet
Wi-Fi Protected Access (WPA): A wireless security protocol for devices to connect to the internet
Quiz: Module 2 challenge
What network protocol helps data get to the right place by determining the MAC address of the next router or device on its path? 1 point Transmission Control Protocol (TCP) Address Resolution Protocol (ARP) Hypertext Transfer Protocol Secure (HTTPS) Secure Sockets Layer/Transport Layer Security (SSL/TLS)
Address Resolution Protocol (ARP)
AI assistant
The network protocol that helps data get to the right place by determining the MAC address of the next router or device on its path is Address Resolution Protocol (ARP).
ARP is a layer 2 protocol that maps IP addresses to MAC addresses. When a device wants to send data to another device on the same local network, it needs to know the MAC address of the destination device. ARP works by broadcasting a message to all devices on the network asking for the MAC address of the device with the specified IP address. The destination device then responds with its MAC address, and the sending device can then send the data directly to the destination device.
The other options are not correct:
- Transmission Control Protocol (TCP) is a layer 4 protocol that provides reliable end-to-end communication.
- Hypertext Transfer Protocol Secure (HTTPS) is a layer 7 protocol that provides secure communication over the internet.
- Secure Sockets Layer/Transport Layer Security (SSL/TLS) is a cryptographic protocol that provides secure communication over a network.
Therefore, the answer is Address Resolution Protocol (ARP).
Fill in the blank: The _ maintains Wi-Fi standards.
IEEE 802.11
Fill in the blank: A __ firewall operates based on predefined rules. It is not used to keep track of information from data packets.
stateless
Which of the following types of firewalls can perform deep packet inspection and intrusion detection?
Next generation firewall (NGFW)
What network security service masks a device’s virtual location to keep data private while using a public network?
Virtual private network (VPN)
Which of the following does encapsulation protect?
data in transit
What network is part of the uncontrolled zone?
Internet
AI assistant
The Internet is part of the uncontrolled zone.
The uncontrolled zone is a network that is not under the control of an organization. It is typically accessible to anyone with an internet connection. The uncontrolled zone is a high-risk environment, as it is often targeted by malicious actors.
Internal networks, subnets, and web servers are typically part of the controlled zone. The controlled zone is a network that is under the control of an organization. It is typically protected by firewalls and other security measures.
Therefore, the answer is Internet.
What network zone acts as a network perimeter to the internal network by isolating servers that are exposed to the internet?
Demilitarized zone
AI assistant
The network zone that acts as a network perimeter to the internal network by isolating servers that are exposed to the internet is the Demilitarized zone (DMZ).
A DMZ is a network segment that sits between the internal network and the internet. It contains servers and other devices that are accessible to the public, such as web servers, email servers, and DNS servers. The DMZ is isolated from the internal network by firewalls, which helps to protect the internal network from attack.
The other options are not correct:
- The uncontrolled zone is the internet. It is not under the control of any organization and is therefore not suitable for isolating servers that are exposed to the internet.
- A virtual private network (VPN) is a network that encrypts traffic and tunnels it through another network. VPNs are commonly used to connect remote users to a corporate network, but they are not typically used to isolate servers that are exposed to the internet.
- A restricted zone is a network segment that contains sensitive data or applications. It is typically isolated from the rest of the network by firewalls and other security measures.
Therefore, the answer is Demilitarized zone (DMZ).
Which of the following services client requests by forwarding them to other servers?
Proxy server
Fill in the blank: A __ accepts traffic from external parties, approves it, then forwards it to internal servers.
reverse proxy server
What network protocol translates the domain name of a website’s server into an IP address?
Domain name system (DNS)
Which type of firewall analyzes network traffic for suspicious characteristics and behavior and stops them from entering the network?
Stateful
Which firewall offers the most security features?
Next generation firewall (NGFW)
What does a VPN service use to transfer encrypted data between a device and the VPN server?
encapsulation
What network zone contains the internet and other services that are outside of an organization’s control?
Uncontrolled
A security analyst implements a proxy server to secure internal networks. What are some of the proxy server’s primary functions? Select three answers.
- Use public IP addresses that are different from the rest on the private network
- Temporarily stores data that is frequently requested by external servers
- Determine whether requests to connect to a website are allowed
Which of the following statements accurately describe forward and reverse proxy servers? Select three answers.
- Reverse proxy servers accept traffic from external parties, approve it, then forward it to internal servers.
- Forward proxy servers regulate and restrict a person’s access to the internet.
- Forward proxy servers receive outgoing traffic from an employee, approve it, then forward it to its destination on the internet.