CDC 3D053 Cyber Surety Volume 2. Information Protection - Boundary Control Journeyman URE's
I
II
III
IV
I
II
III
IV
I
II
III
IV
Maintain sole administrative privileges on the firewall.
Standardize, configure, back up, and otherwise maintain the firewall.
Maintain a single naming/configuration standard for boundary devices.
Install patches or perform any upgrades provided by AF Enterprise Network.
Switches.
Firewalls.
Routers.
Servers.
Active IDS.
Passive IDS.
Host-based IDS.
Network-based IDS.
Active IDS.
Passive IDS
Host-based IDS.
Network-based IDS.
Update IDS signatures periodically.
Deploy one IDS for the entire network.
Use a centralized management console for system management.
Consider using either a network-based IDS or host-based IDS.
Can analyze any encrypted data if it is decrypted before reaching the target host.
Consumes resources on the host it resides on and slows that device down.
Monitors log files for inadvisable settings or passwords.
Monitors traffic on the host on which it is installed.
Cannot analyze encrypted packets because it has no method for decrypting the data.
Monitors log files for inadvisable settings or passwords.
Monitors traffic on the network on which it is installed.
Consumes very few network resources.
Active IDS.
Passive IDS.
Host-based IDS.
Network-based IDS.
Active IDS.
Passive IDS.
Host-based IDS.
Network-based IDS.
0–1023.
1024–23535.
23536–49151.
49152–65535.
Is the act of sporadically scanning a computer’s ports.
Sends out a request to connect to any computer.
Notes which ports responded to the scan.
Is always malicious in nature.
Strobe.
Sweep.
Stealth.
Vanilla.
Presentation.
Transport.
Network.
Session.
Air Force Network Integration Center (AFNIC).
Air Force Network Operations Center (AFNOSC).
Air Force Information, Services and Integration Directorate (SAF/XCIA).
Air Force Network Operations Commander (AFNetOps/CC).
Air Force Network Integration Center (AFNIC).
Air Force Network Operations Center (AFNOSC).
Air Force Information, Services and Integration Directorate (SAF/XCIA).
Air Force Network Operations Commander (AFNetOps/CC).
Private.
Public.
Secure.
Unsecure.
Use access control lists on SNMP agents to accept SNMP messages from all SNMP managers.
Keep devices requiring SNMP together with those that do not through VLANs.
Disable all SNMP devices/services if not required.
Enable the set community strings if possible.
WU_PingProPack.
SolarWinds.
SNMPutil.
Security mapper (SMAP).
Snort.
Open source security (OSSEC).
Host based security system (HBSS).
Intruder alert (ITA).
Snort.
Automatic Security Incident Measurement (ASIM).
Enterprise Security Manager (ESM).
Internet Security Scanner (ISS).
Snort.
Automatic Security Incident Measurement (ASIM).
Enterprise Security Manager (ESM).
Internet Security Scanner (ISS).
Firewalls.
Information condition (INFOCON).
Security tools.
Defense in depth.
Wait!
Here's an interesting quiz for you.