Information Security Human Firewall
Information Security Human Firewall
Vid 1:
Botnet – command and control server accessible in the internet, that thru a malware installed on some
unsuspecting computers will wait patiently for instructions from the command and control server.
Cyber Criminals
Ransomware – extort money, demanding the money to get the encryption key
Cyber Warriors
Zero Day
Vid 2:
Information Security
Human Firewall
- commonsense
Data Protection
1. Virus
2. Worm
3. Botnet
4. Trojan Horse
5. DDoS
6. Ransomware
Social Engineering
Zero day – an unpatched vulnerability that only an attacker knows about and often sells on the black
market for large sums of money
Password Manager
- Physical Token
- One time code
Backup
Archiving
Mobile Security
Domain Spoofing
Insider Threats:
Vid 6:
Vid 7:
- Reports to CEO
- Manage Financial Risk of company
- Past, present future
- Past : Looking back, assess report goals and forecasts
- Present: how to invest, capital structure of the company
- ERP Enterprise Resource Planning
- Future: Financial Forecasts
- Valuable Data Assets
Vid 9:
Attack Surface
Assessment 1:
1. It is OK to use the same password for all your online accounts as long as you keep it a
secret
- TRUE
2. What is the first thing you should do if your company is facing ransomware demands?
- Contact the police and do not pay the ransom
3. Cybersecurity is the responsibility of:
- Everyone in the company
4. What does the “https://” at the beginning of a URL denote, as opposed to
“http://” (without the “s”)?
- That information entered into the site is encrypted
5. I can always trust emails and attachments I get from different people.
- FALSE
6. Brute Force is a way of finding out the right credentials by repetitively trying all the
permutations and combinations of possible credentials.
How can you prevent a brute force attack? (Choose three.)
- Set a minimum length for password ,
- Increase the password complexity ,
- Set a limit on login failures
7. How can data be safeguarded?
- All of the above
8. When is it ok to reuse a password?
- Never
9. Which of the following is an example of a “phishing” attack?
- All of the above
10. Personal Identifiable Information (PII) is used to verify your identity and distinguish one
person from another. Which of the following is an example of PII?
- All of the above
11. Is someone or something that can cause potential harm and damage to your
organization.
- Threat
12. A phishing attack can harm your personal computer only, but not your company’s
network
- False
13. Are the damages that can be caused to the organization by exploiting vulnerabilities.
- Risks
14. Cybersecurity is IT's responsibility. The everyday endusers in the office don't need to
worry about this topic
- False
15. What are the common types of cyberattacks an enterprise is likely to face?
- All of the above
16. It assures the information is trustworthy and reliable
- Integrity
17. Is a vulnerability that could happen if an application/network/device is susceptible to
attack due to an insecure configuration option. It can be as simple as keeping the default
username/password unchanged.
- Security misconfiguration
18. What are some ways you can support password security?
- All of the above
19. A collection of rules that limits access to information.
- Confidentiality
20. Possible threat to any information cannot be ________________
- Ignored
21. What is the weakest link in cybersecurity?
- Humans
22. Small businesses are safe from cyber attack(s).
- False
23. Are used by cybercriminals to fool people into believing them as credible individuals to
get them to reveal confidential information such as credit card details, internet banking
credentials, and other sensitive data
- Social engineering attacks
24. Is a group of internet-connected devices such as servers, PCs, mobile devices, etc.,
that are affected and controlled by malware
- Botnet
25. If a public Wi-Fi network (such as in an airport or café) requires a password to access, is
it generally safe to use that network for sensitive activities such as online banking?
- No, It is not safe
26. Distributed Denial of Service (DDoS) is a method where cybercriminals flood a network
with so much traffic that it cannot operate or communicate as it normally would.
- Use anti-DDoS services ,
- Use load balancing
27. What is the best way to keep employees from falling for phishing scams?
- Cybersecurity awareness training
28. Refer to the weakest points in your systems that can be exploited by a cyber-criminal.
- Vulnerabilities
29. It provides reliable access to data for authorized people.
- Availability
30. Your passwords should be easy to remember and hard to guess, which of the following
is an example of strong password?
- $ayN02#ackers
1/28/22
Bad Actors:
1. The Explorer
2. The Hacktivist
3. Cyber Terrorist
4. Cyber Criminal
5. Cyber Warrior
1/31/22
QUIZ NSE 1
2/3/22
Cloud
Visualization
- Services where the cloud provider manages more than the underlying infrastructure such as:
o OS patching
- Becoming increasingly prevalent
- Expensive company-owned hardware capital assets
- Recurring operating cost
Security is the shared responsibility between the cloud provider and the customer utilizing the cloud
service.
- Physical components
- Logical components
Security tools
- Problems:
o Basic security functions
o Same tools vendors use to secure underlying infrastructure
Vendor A IaaS cloud platform, Vendor B cloud platform, Multiple SaaS vendors
Mult-Cloud Environment – a problem where complexity can scale geometricly with the number of cloud
vendors involved.
Fortinet:
1. Fortigate
2. Fortimail
3. Fortiweb
4. Fortisandbox
5. Fortiinsight
6. Fortinet security fabric
1. Amazon AWS
2. Microsoft Azure
3. Google cloud
4. VMware
5. Cisco ACI
6. Oracle cloud
7. IBM
LESSON 2: SD-WAN
- A computer network that expands a wide geographic area and typically consists of two or more
LANs.
SaaS (Software as a Service)
- Sales voice
- Google apps
- Drop box
Increasing hybrid connections and Growth of cloud applications to support underlying business decisions
led to the First Generation of SD-WAN
Point products:
- Escalate complexity to the network infrastructure
SD-WANs’ basic load end technique allowed:
- Application intelligent business decisions on hybrid WAN links:
o service provider
o broadband
o long-term evolution LTE
- which are the standard for wireless broadband communication for mobile devices and data
terminals
Address these challenges by integrating security and networking functionalities into a single secure SD
WAN Appliance
- this enabled businesses to replace their multiple point products with a powerful single security
appliance
- reduced cost
- ease of management
- business policy workflows make it easy to configure and manage the application it needs
Centralized management console provides
- single pane-of-glass visibility
- Telemetry
o to identify
o troubleshoot
Stateful firewalls
- Second-Generation Firewalls
- Designed to observe this network connection overtime
- Acceptable protocol such as HTTP
HTTP
- Frequently used network protocols
- Used in many ways
- Static text content
- E-commerce
- File hosting
- Web applications
o They use the same port number so the firewall cannot distinct them
Lesson 5: Wifi:
Wifi
- Technology for wireless local area networking
- Base on the IEEE 802. 11 standards
Wired Equivalent Privacy (WEP)
- Used a key for traffic using the RC4 keystream
Wi-fi Protected Access (WPA)
- Added security features that retain the RC4 algorithm which made it easier for users to upgrade
their older devices however it still didn’t solved the fundamentals security problems
Wi-fi Protected Access 2 (WPA2)
- Advanced Encryption Standard (AES)
- From the National Institute of Standards and Technology (NIST)
- New enterprise authentication was added
- The personal users security
o Shard passphrase
- The enterprise security level used
o 802.1x authentication mechanisms
Lesson 7: SOAR
Security Orchestration Automation & Response (SOAR)
- Connects and synchronizes technologies through automation, overseen by human authority.
Enabling security teams to efficiently run security teams and effectively respond to threats.
- Increase security efficiency by automation.
Alert Fatigue
- Performance degradation in the face of flood of alerts
SOAR
- Ties together the tools already present in your security stack
- By pulling data in from all of these sources, SOAR can reduce the amount of context switching
that your analysts have to do.
- Those processes can be translated into a playbook which is a flowchart like set of steps either
manual or automated which can be repeated on demand.
- Called orchestration and automation
- Investigation
o Checking threat
Playbooks
- Known as:
o Automated processes
o Workflows
o Playbooks
- As a way to response to alerts or incidents the same way every time.
- Playbooks works in lock steps with security teams by taking the steps and analyst with typically
implement when responding to an incident
- Playbooks will take care of competitive tasks such as:
o Compiling data into a report
o Sending emails
o Can pause when human oversight is needed before implementing a firewall block for
instance.
- Playbooks are the key to SOAR automation capability
- Allowing teams to improve their response speed and consistency while maintaining human
authority of a process
- Leads to reduce analyst workload and chance of error
Authentication method:
- Client device
o Provides credentials in the form of a username and password, digital certificate or some
other means to the authenticator which forwards this authenticator to the server
depending on the outcome of authentication.
- Authenticator
o Network switch or Wireless access point that demarks the protected network from the
unprotected network
o The authenticator either block the device or allow access to the network.
- Authentication server
Captive Portal
- Another method to control access to a network especially the publicly available network
- A webpage that asks you to agree to legal terms before granting access
NAC
IoT:
o Variety of devices
o Lack of standards
o Inability to secure these devices
- Shared secret unique serial number
NAC
FortiNAC
Lesson 9: Sandbox
Sandbox
Zero-day Attack
- Equipped with more integration tools or partnered with other vendors to improve integration
- As a result, they can share thread intelligence with other security devices (threat analysis
standard with other security devices) such as:
o Firewalls
o Email gateways
o Endpoints
o Sandbox devices
- The new approach to network security allowed analysts:
o to correlate threat intelligence centrally
o Respond to threats from a single pane-of-glass
- Threat intelligence service in the cloud
- AI generated attacks
- Threat analysis standard
- Needed to cover the expanding attack surfaces
- Digital transformation
o Refers to the movement of business data, applications and infrastructure to the cloud
MITRE
- Non-profit organization
- Proposed the ATT&CK Framework
o Describes standard malware characteristics categorically.
o It provided security devices with common language used in which to Identify, describe,
and categorize threats which could be shared with and understood by other devices.
AWS
- Provides:
o Applications
o Platforms
o Infrastructure as a Service in the public cloud
Sandbox technology evolved to provide wider coverage to these areas and others as they developed.
FortiSandbox
Security Fabric
FortiGuard Labs
- Introduced in 2005
- Analyzes security alerts in real time
- Does 3 things:
o Collect normalize and store log events in the organizations’ network and security
devices, servers, DB, applications, and endpoints in a secure central location, both
physical and virtual
o Run advance analytics on the data both in real time and across historical data
- Simple cross-correlation rules
- User-behavioral anomalies
- Indicators of compromise IoC
- Machine Learning
o Prove security controls are in place and effective
FortiSIEM
- Appliance or software that monitors and blocks HTTP traffic to and from the web application
- It differs to a traditional edge firewall and that it targets the content from specific web
applications and at the application level while edge firewalls fashion secure gateways in the local
area network (LAN) and outside servers in the network level specifically by inspecting HTTP
traffic
- Web application security flaws such as:
o SQL injection
Asks for a user id and password abc1234 or 2+2=4
o Cross-site scripting
o File inclusion
o Security misconfigurations
- WAF ancestors:
o Early application firewall 1990s
File transfer protocol (FTP)
Remote shell (RSH)
Command line computer program
- Blacklists
- Signature-based HTTP attributes
- Behavior analysis can be done in machine speeds and can adapt the ever changing attributes of
the threat
- Augmented to the firewall
o Distributed denial of service
o IP reputation
o Anti-virus
o Data Leak Prevention (DLP)
o Monitor HTTP behavior
o Enforce user role permissions
- Interlocking defense
- Sandbox – zero day attack
- New informations are uploaded to Threat intelligence center
FortiWeb
- FortiGate
- FortiSandbox
- FortiGuard
Spam
- Act of sending irrelevant and unsolicited messages on the internet to a large number of
recipients
Phishing
Spam filters
- Email authentication method that detects bogus sender addresses and emails
FortiMail
FortiManager
FortiGuard Labs
Web Filter
- Application that examines incoming web pages to determine if some or all of the contents
should be block
- The web filters make these decisions based on rules set in place by the organization or individual
who install the application
- Can stablish different rules for different types of users
- 2004
- Requiring all public computers in the library to have web filters
- Adware
- Spam
- Viruses
- Spyware
- A web filter can console the URL database that stores websites and domains that are known to
host malware, phishing and other harmful tools
- Deny List
- Allow List
- Keyword
- Pre-defined content
Machine learning is the next step in building more effective web filters
FortiClient
FortiGate
FortiAP