Unit First
Unit First
Network security is any activity designed to protect the usability and integrity of your
network and data.
It includes both hardware and software technologies
Firewalls
Firewalls put up a barrier between your trusted internal network and untrusted outside
networks, such as the Internet. They use a set of defined rules to allow or block traffic. A
firewall can be hardware, software, or both.
Email security
Email gateways are the number one threat vector for a security breach. Attackers use personal
information and social engineering tactics to build sophisticated phishing campaigns to
deceive recipients and send them to sites serving up malware. An email security application
blocks incoming attacks and controls outbound messages to prevent the loss of sensitive data.
"Malware," short for "malicious software," includes viruses, worms, Trojans, ransomware,
and spyware. Sometimes malware will infect a network but lie dormant for days or even
weeks. The best antimalware programs not only scan for malware upon entry, but also
continuously track files afterward to find anomalies, remove malware, and fix damage.
Network segmentation
Access control
Not every user should have access to your network. To keep out potential attackers, you need
to recognize each user and each device. Then you can enforce your security policies. You can
block noncompliant endpoint devices or give them only limited access. This process is
network access control (NAC).
Application security
Any software you use to run your business needs to be protected, whether your IT staff builds
it or whether you buy it. Unfortunately, any application may contain holes, or vulnerabilities,
that attackers can use to infiltrate your network. Application security encompasses the
hardware, software, and processes you use to close those holes.
Behavioral analytics
To detect abnormal network behavior, you must know what normal behavior looks like.
Behavioral analytics tools automatically discern activities that deviate from the norm. Your
security team can then better identify indicators of compromise that pose a potential problem
and quickly remediate threats.
Data loss prevention
Organizations must make sure that their staff does not send sensitive information outside the
network. Data loss prevention, technologies can stop people from uploading, forwarding, or
even printing critical information in an unsafe manner.
Intrusion prevention systems
An intrusion prevention system (IPS) scans network traffic to actively block attacks.
Cisco Next-Generation IPS (NGIPS) appliances do this by correlating huge amounts of
global threat intelligence to not only block malicious activity but also track the progression of
suspect files and malware across the network to prevent the spread of outbreaks and
reinfection.
Cybercriminals are increasingly targeting mobile devices and apps. Within the next 3 years,
90 percent of IT organizations may support corporate applications on personal mobile
devices. Of course, you need to control which devices can access your network. You will also
need to configure their connections to keep network traffic private.
Security information and event management
SIEM products pull together the information that your security staff needs to identify and
respond to threats. These products come in various forms, including physical and virtual
appliances and server software.
VPN
A virtual private network encrypts the connection from an endpoint to a network, often over
the Internet. Typically, a remote-access VPN uses IPsec or Secure Sockets Layer to
authenticate the communication between device and network.
Web security
A web security solution will control your staff’s web use, block web-based threats, and deny
access to malicious websites. It will protect your web gateway on site or in the cloud. "Web
security" also refers to the steps you take to protect your own website.
Wireless security
Wireless networks are not as secure as wired ones. Without stringent security measures,
installing a wireless LAN can be like putting Ethernet ports everywhere, including the
parking lot. To prevent an exploit from taking hold, you need products specifically designed
to protect a wireless network.
Physical access control: limits access to campuses, building and other physical
assets, e.g. a proximity card to unlock a door.
Logical access control: limits access to computers, networks, files and
other sensitive data, e.g. a username and password.
For example, an organization may employ an electronic control system that relies on
user credentials, access card readers, intercom, auditing and reporting to track
which employees have access and have accessed a restricted data center. This
system may incorporate an access control panel that can restrict entry to individual
rooms and buildings, as well as sound alarms, initiate lockdown procedures and
prevent unauthorized access.
Firewalls operate using specific firewall rules. A firewall rule will typically include a
source address, a protocol, a port number and a destination address.
Only trusted people (source addresses) may enter the castle (destination address) at
all. Or perhaps only people that arrive on foot (protocol). Once inside, only people
within the house are permitted to enter certain rooms (destination ports), depending
on who they are. The king may be allowed in any room (any port), while guests and
servants may only access a certain number of rooms (specific ports).
In this analogy, the firewall would act like an elaborate alarm system.
Next, and this is the most common distinction between types, firewalls are classified
by functionality.
Packet-filtering firewalls
Proxy firewalls
NAT firewalls
Web application firewalls
Next-gen firewalls (NGFW)
Packet-filtering firewalls
Packet-filtering firewalls, the most basic firewall type, examine packets and prevent
them from moving on if the specific security rule is not met. This firewall's function is
to perform a simple check of all data packets arriving from the network router and
inspecting the specifics like source and destination IP address, port number,
protocol, and other surface-level data.
Packet filtering firewalls don’t open data packets to inspect their contents. Any data
packet that fails the simple inspection is dropped.
Their main drawback is that they provide only basic protection and are therefore
more vulnerable to being bypassed.
Packet-filtering firewalls can either be stateful and stateless. Stateless firewalls only
analyze each packet individually, whereas stateful firewalls — the more secure
option — take previously inspected packets into consideration.
Proxy firewalls
NAT firewalls
NAT firewalls and proxy firewalls both act as a go-between connecting groups of
devices with outside traffic.
Web application firewalls (WAF) are responsible for filtering, monitoring, and
blocking data packets as they travel in and out of websites or web applications. A
WAF can either reside on the network, at the host or in the cloud and is typically
placed in front of one or many websites or applications. WAFs are available as
server plugins, cloud services, or network appliances.
A WAF is most similar to the proxy firewall, but has a more specific focus on
defending against application layer web-based attackers.
NGFW firewalls
As the threat landscape intensifies, the Next-generation firewall (NGFW) is the most
popular firewall type available today.
Firewalls
For most networks, the firewall is one of the first lines of defense. Firewalls act to
isolate your network and protect it from unwanted network traffic. Depending
on your network, firewalls can be built into devices such as routers and switches
or implemented as standalone protection.
Firewalls can operate in two ways:
MFA Examples
Examples of Multi-Factor Authentication include using a
combination of these elements to authenticate:
Knowledge
Possession
Inherence
Location-based
Location-based MFA usually looks at a user’s IP address and, if
possible, their geo location. This information can be used to
simply block a user’s access if their location information does
not match what is specified on a whitelist or it might be used as
an additional form of authentication in addition to other factors
such as a password or OTP to confirm that user’s identity.
The risk level is calculated based upon how these questions are
answered and can be used to determine whether or not a user
will be prompted for an additional authentication factor or
whether or not they will even be allowed to log in. Thus another
term used to describe this type of authentication is risk-based
authentication.