Assignment 2
Assignment 2
Security Products
Brandon Kettle
1
Vehicle Security
numerous benefits, but also new security risks. One such risk is the potential for
remote attacks. These attacks occur when hackers exploit one of many possible
gain unauthorized access and control over various functions of the vehicle.
features such as locking/unlocking doors, starting the engine, controlling the radio or
GPS navigation system, and even disabling critical safety systems like brakes or
the Object Exchange (OBEX) transfer protocol. This protocol has no authentication
measures making it an easy exploit for those who know how to intercept it. An attacker
can also use telematics to gain access to a vehicle. Attackers are able to gain access
because of an exploitable port left open by the manufacture. Ports are communication
endpoints that allow different devices and services to connect and exchange data over
a network. When a port is left open, it means that there is an active connection point
that can be exploited. By scanning for open ports, attackers can identify vulnerable
2
vehicles and launch various types of attacks. Additionally, open ports can also be used
to install backdoors or other malicious software that can compromise the security of
the vehicle. This poses a serious threat to both the safety of drivers and passengers,
about keeping their systems up-to-date and avoid connecting to unsecured networks
while driving. By taking these precautions, we can help prevent malicious actors from
HIDS
sensitive information from cyber threats. Three popular network firewalls that are
widely used in the industry are Cisco ASA, Palo Alto, and Fortinet FortiGate.
Cisco ASA is a widely used firewall known for its robust security features and
scalability. One of its key features is the ability to provide stateful inspection, which
3
allows it to monitor and control incoming and outgoing traffic based on predefined
rules. Additionally, Cisco ASA supports VPN connectivity, intrusion prevention, and
threat detection capabilities. However, like any technology, Cisco ASA also has its
limitations. One major limitation is its performance bottleneck when handling high
volumes of traffic. This can lead to latency issues and decreased network efficiency.
Palo Alto Networks is another top choice for organizations looking for threat
prevention capabilities. The platform also includes advanced features such as URL
filtering, application control, and SSL decryption. However, Palo Alto Networks has a
high cost associated with implementing and maintaining the platform. Additionally,
some users have reported difficulties in integrating Palo Alto Networks with other
Fortinet FortiGate, another popular firewall, is known for its security features
including firewall protection, intrusion prevention, and VPN capabilities. The standout
advantage of Fortinet Fortigate is its user-friendly interface, making it easy for even
In conclusion, while all three firewall solutions have strong security features,
organizations should carefully evaluate their specific needs and requirements before
4
Task 2
- The more complex a system or network is, the harder it becomes to secure it
manage, making it easier for hackers to find weaknesses and exploit them.
Additionally, complex systems often require more resources and expertise to secure
properly, which can lead to oversights and gaps in security measures. Simplicity, on
the other hand, is key to effective security. By keeping systems and networks as
simple as possible, organizations can reduce the potential attack surface and make it
organizations can significantly reduce the likelihood of falling victim to cyber attacks.
- The earlier a cybersecurity threat is detected, the better chance there is of mitigating
its impact.
- Sun Tzu, "The supreme art of war is to subdue the enemy without fighting" Just as in
deception rather than brute force, cybersecurity professionals must employ cunning
5
tactics to outwit malicious hackers. By focusing on prevention and proactive defense
measures, organizations can effectively neutralize threats before they have a chance
to cause harm. This approach involves constantly monitoring networks for suspicious
activity, implementing strong encryption protocols, and staying one step ahead of
cybercriminals, security experts can anticipate their next move and take preemptive
action to thwart their efforts. In essence, the key to success in cybersecurity lies in
than engaging in direct confrontation. Just as Sun Tzu's teachings emphasize the
- Mitre Att&ck, short for Adversarial Tactics, Techniques, and Common Knowledge, is a
comprehensive framework that categorizes and describes the various tactics and
Developed by the Mitre Corporation, this framework provides a common language for
Mitre Att&ck is organized into several categories, including initial access, execution,
techniques that adversaries may use to achieve their objectives. By using Mitre Att&ck
6
threat actors and develop more effective defence strategies. This framework helps
security teams prioritize their efforts and focus on mitigating the most critical threats
- TTPs, or Tactics, Techniques, and Procedures refer to the methods used by threat
actors to carry out attacks. By analyzing these tactics, techniques, and procedures,
organizations can identify patterns and trends in cyber threats. This information can
then be used to develop effective defense strategies and improve overall security
to continuously monitor and analyze cyber threats. By staying informed about the
latest TTPs employed by threat actors, organizations can proactively update their
https://www.techtarget.com/searchmobilecomputing/definition/bluesnarfing
7
https://sysdig.com/learn-cloud-native/detection-and-response/what-is-hids/
https://www.dnsstuff.com/host-based-intrusion-detection-systems
https://www.geeksforgeeks.org/adaptive-security-appliance-asa-features/