Network Security and Cyber Security
Network Security and Cyber Security
RADIUS TACAS+
Transport Protocol UDP TCP
49.Evaluating Alerts
- True Positive: Attack, Alarm, ideal setting.
- True Negative: no attack, no Alarm, ideal Setting.
- False Positive: no attack, Alarm, needs to tune Alarm, Undesirable.
- False Negative: Attack, no Alarm, needs to tune Alarm, Dangerous.
50.Traditional Endpoint Security
- Antivirus/Antimalware Software
- Host-based IPS
- Host-based firewall
51.Network-Based Malware Protection devices.
- Advanced Malware Protection (AMP)
- Email Security Appliance (ESA)
- Web Security Appliance (WSA)
- Network Admission Control (NAC)
52.Network Access Control
- Profiling and visibility: recognizes and users and their devices.
- Guest network access: guest registration and authentication.
- Security posture checking: evaluates security-policy for user and OS
- Incident response: Mitigating network threats without administrator
attention.
53. IEEE 802.1X
- standard defines authentication protocol that restricts unauthorized
workstations from connecting to a LAN through switch ports.
54.Switch Attack Categories
- MAC Table Attacks: Attacker use MACOFF tool for Mac Address Flooding.
- VLAN Attacks: VLAN hopping and VLAN double-tagging attacks.
- DHCP Attacks: DHCP starvation and DHCP spoofing attacks.
- ARP Attacks: ARP spoofing and poisoning attacks
- Address Spoofing Attacks: MAC Address and IP address spoofing attacks
- STP Attacks: Spanning Tree Protocol manipulation attacks
55.Switch Attack mitigation
- Port Security: Port security prevents many types of attacks including MAC
table overflow attacks and DHCP starvation attacks.
- DHCP Snooping: DHCP Snooping prevents DHCP starvation and DHCP
spoofing attacks by rogue DHCP servers
- Dynamic ARP Inspection (DAI): DAI prevents ARP spoofing and ARP poisoning
attacks.
- IP Source Guard (IPSG): IP Source Guard prevents MAC and IP address
spoofing attacks.
56.PVLAN
divide the broadcast domain into multiple broadcast sub-domains
- Promiscuous:
- Isolated:
- Community:
57.securing communications:
- Authentication: validating a source in network communications.
- data nonrepudiation: sender of a message to be uniquely identified (Digital
Certificate)
- Confidentiality: Data confidentiality ensures privacy so that only the
receiver can read the message. (encryption)
- Integrity: messages are not altered in transit (Hashing)
58. Cryptographic Services
- Cryptography: security professionals for encryption - development and use
of codes
- Cryptanalysis: Hackers for decryption and crack - breaking of those codes
- Cryptology: Science for Cryptography and Cryptanalysis.
59. securing communications Algorithms
- Data Integrity : Integrity is ensured by implementing either of the Secure
Hash Algorithms (SHA-2 or SHA-3). The MD5
- Origin Authentication: networks ensure authentication with algorithms
such as hash-based message authentication code (HMAC).
- Data Confidentiality: Data confidentiality is implemented using symmetric
and asymmetric encryption algorithms.
Symmetric algorithms: DES, 3DES, AES, SEAL, RC.
Asymmetric algorithms: RSA, DSS, DSA, DH, ElGamal, ECT.
- Data Non-Repudiation : Nonrepudiation relies on the fact that only the
sender has the unique characteristics or signature for how that message is
treated.
60.Public and Private Keys
- Confidentiality: Encrypt Public Key + Decrypt Private Key (Destination)
- Authentication: Encrypt Private Key + Decrypt Public Key (Source)
61.Diffie-Hellman
Diffie-Hellman (DH) is an asymmetric mathematical algorithm that allows two
computers to generate an identical shared secret without having
communicated before.
62.VPN
- VPNs create end-to-end private network connections
- it carries information within a private network, but that information is
transported over a public network.
63.VPNs encryption features
- Internet Protocol Security (IPsec)
- Secure Sockets Layer (SSL)
64.VPN Benefits vs Leased Lines
- Cost Savings (no need for ISPs service Fees)
- Security (carries information within a private network over public network)
- Scalability (Remote Access VPN)
- Compatibility of WAN link options (supports all popular broadband
technologies)
65.VPN Topologies
- Site-to-Site VPNs
- Remote-Access VPNs
66.compares IPsec and SSL remote access
Feature IPsec SSL
Applications supported Supports All Apps web-based applications
Authentication strength Strong Moderate
Encryption strength Strong Moderate – Strong
Connection complexity Moderate Low
Connection option Only specific devices Any device with a web
with specific browser
configurations
67.IPsec Framework
- IPsec Protocol:AH – ESP – AH+ESP
- Confidentiality: DES-3DES-AES - SEAL
- Integrity: MD5 – SHA1 – SHA2
- Origin authentication: PSK – RSA
- Diffie-Hellman: DH1 – DH2 - …. – DH24
68.IPsec Protocol Encapsulation
- AH :
appropriate only when confidentiality is not required.
AH uses IP protocol 51
- ESP :
provides both confidentiality and authentication.
ESP uses IP protocol 50
- AH + ESP
69.IPsec Protocols Modes
- Transport Mode: protects the payload of the packet but leaves the original
IP address in plaintext.
- Tunnel Mode: The original IP packet is encrypted and then it is
encapsulated in another IP packet
70.The IKE Protocol
enhances IPsec by adding features and simplifies configuration for the IPsec.
- phase 1 : uses ISAKMP
- phase 2 : key negotiation
71. ISAKMP
- negotiates a security association (a key) between two IKE peers
72. Advanced ASA Firewall Features
- A single ASA can be partitioned into multiple virtual devices (called a
security context)
- Failover configuration to provide device redundancy (devices must be
identical.
- The ASA provides access control based on an association of IP addresses to
Windows Active Directory login information.
- ASA uses the Advanced Inspection and Prevention (AIP) modules
integrating the Content Security and Control (CSC) module.
Advanced Inspection and Prevention Security Services Module (AIP-SSM)
Advanced Inspection and Prevention Security Services Card (AIP-SSC)
73. Cisco Firepower Series
- Next-generation IPS (NGIPS)
- Advanced Malware Protection (AMP)
- Application control and URL filtering
74.ASA Firewall Modes of Operation
- Routed Mode:
two or more interfaces separate Layer 3 networks
Routed mode supports multiple interfaces
Each interface is on a different subnet and requires an IP address on
that subnet.
ASA applies policies to flows as they transit the firewall
- Transparent Mode:
ASA functions like a Layer 2 device and is not considered a router hop.
ASA is only assigned an IP address on the local network for management
purposes
This mode is useful to simplify a network configuration, or when the
existing IP addressing cannot be altered
no support for dynamic routing protocols, VPNs, QoS, or DHCP Relay.
75.Network Security Monitoring Tools
- Network protocol analyzers
- NetFlow
- Security Information and Event Management Systems (SIEM)
76.SIEM
provide real time reporting and long-term analysis of security events
- Forensic analysis
- Correlation
- Aggregation
- Reporting
77.SIEM and SOAR
SIEM SOAR
provides details on the source of enhances SIEM, enhanced data
suspicious activity. gathering and a number of
functionalities
that aid in security incident response
User information such as username, Use artificial intelligence to detect
authentication status, location incidents
78.IP Vulnerabilities
- ICMP attacks
- DoS attacks
- DDoS attacks
- Address spoofing attacks
- Address spoofing attacks
- Session hijacking
79. TCP Vulnerabilities
- TCP SYN Flood Attack
- TCP Reset Attack
- TCP Session Hijacking
80.UDP Attacks
- UDP Flood Attacks
88.Cisco Talos
- Talos is one of the largest commercial threat intelligence teams in the
world
- The team collects information about active, existing, and emerging threats,
and then provides comprehensive protection against these attacks and
malware to its subscribers.
- Cisco Security products can use Talos threat intelligence in real time
- Cisco Talos also provides free software, services, resources, data and
maintains the security incident detection rule sets for the Snort.org,
ClamAV, and SpamCop network security tools
89.FireEye
- FireEye is another security company that offers services to help enterprises
secure their networks.
- It uses a three-pronged approach combining
security intelligence,
security expertise,
and technology.
104. CVE
- identifier provides a standard way to research a reference to
vulnerabilities
- CVE Details website provides a linkage between CVSS scores and CVE
information.
105. NVD
- utilizes CVE identifiers and supplies additional information on
vulnerabilities such as CVSS threat scores, technical details, affected
entities, and resources for further investigation.
- database was created and is maintained by the U.S (NIST)
106. Risk Management
- Risk avoidance: Stop performing the activities that create risk
- Risk reduction: Take measures to reduce vulnerability
- Risk sharing: Shift some risk to other parties.
- Risk retention: Accept the risk and its consequences.
107. Vulnerability Management
- Discover: Develop a network baseline. Identify security vulnerabilities
on a regular automated schedule.
- Prioritize Assets: Categorize assets into groups or business units, and
assign a business value based on their criticality to business operations
- Assess: Determine a baseline risk profile to eliminate risks based on
asset criticality, vulnerability, threats, and asset classification.
- Report: - Measure the level of business risk associated with your assets
according to your security policies. Document a security plan, monitor
suspicious activity, and describe known vulnerabilities
- Remediate: Prioritize according to business risk and address
vulnerabilities in order of risk.
- Verify : Verify that threats have been eliminated through follow-up
audits.
108. Patch Management Techniques (Self Study)
- Agent-based:
- Agentless Scanning:
- Passive Network Monitoring:
109. Types of Security Data (NOTES)
- Alert Data
- Session and Transaction Data
- Full Packet Captures
- Statistical Data
110. Syslog Message Format
- “PRI (priority), HEADER, MSG (message text)”.
- The PRI consists of two elements, the Facility and Severity
Facility: consists of sources that generated the message, such as the
system, process, or application
Severity: value from 0-7 that defines the severity of the message.
(Emergency- Alert- Critical- Error- Warning- Notice- Informational-
Debug).
“Priority = (Facility * 8) + Severity”
111. SIEM Functions
- Log collection
- Normalization
- Correlation
- Aggregation
- Reporting
- Compliance
112. Splunk
- A popular SIEM, which is made by a Cisco partner.
113. Tcpdump
- The tcpdump command line tool is a very popular packet analyzer
- It can display packet captures in real time.
- It captures detailed packet protocol and content data.
- Wireshark is a GUI built on tcpdump functionality.
114. NetFlow
- protocol that was developed by Cisco as a tool for network
troubleshooting
It records information about the packet flow including metadata
- NetFlow information can be viewed with tools such as the nfdump.
115. Application Visibility and Control (AVC)
- The Cisco Application system combines multiple technologies to
recognize, analyze, and control over 1000 applications
116. Cisco Umbrella
- The Cisco Umbrella suite of security products apply real-time threat
intelligence to managing DNS access and the security of DNS records.
117. Next-Generation Firewalls
- NexGen Firewalls are advanced devices that provided much more
functionality than previous generations of network security devices.
- Common NGFW events include:
Connection Event
Intrusion Event
Host or Endpoint Event
Network Discovery Event
Netflow Event
118. Security Onion
- open-source suite of Network Security Monitoring (NSM) tools that run
on an Ubuntu Linux distribution
- provides three core functions for the cybersecurity analyst such as full
packet capture and data types, network-based and host-based intrusion
detection systems, and alert analyst tools.
- can be installed as a standalone installation or as a sensor and server
platform.
119. Detection Tools for Collecting Alert Data
- CapME: This is a web application that allows viewing of pcap transcripts
rendered with the tcpflow or Zeek tools
- Snort: This is a Network Intrusion Detection System (NIDS). It is an
important source of alert data that is indexed in the Sguil analysis tool.
- Zeek: Formerly known as Bro. This is a NIDS that uses more of a
behavior-based approach to intrusion detection.
- OSSEC: This is a host-based intrusion detection system (HIDS) that is
integrated into Security Onion.
- Wazuh: It is a full-featured solution that provides a broad spectrum of
endpoint protection mechanisms including host logfile analysis, file
integrity monitoring, vulnerability detection, configuration assessment,
and incident response.
- Suricata: This is a NIDS that uses a signature-based approach. It can also
be used for inline intrusion prevention.
-
120. Analysis Tools
- Sguil: This provides a high-level console for investigating security alerts
from a wide variety of sources. Sguil serves as a starting point in the
investigation of security alerts. Many data sources are available by
pivoting directly from Sguil to other tools.
- Kibana: It is an interactive dashboard interface to Elasticsearch data. It
allows querying of NSM data and provides flexible visualizations of that
data. It is possible to pivot from Sguil directly into Kibana to see
contextualized displays.
- Wireshark: It is a packet capture application that is integrated into the
Security Onion suit. It can be opened directly from other tools and
display full packet captures relevant to an analysis.
121. five-tuples
- SrcIP: the source IP address for the event.
- Sport: the source (local) Layer 4 port for the event.
- DstIP: the destination IP for the event.
- DPort: the destination Layer 4 port for the event.
- Pr : the IP protocol number for the event
122. Alerts
- NIDS: Snort, Zeek, and Suricata
- HIDS :OSSEC, Wazuh
- Asset management and monitoring
- HTTP, DNS, and TCP transactions: Recorded by Zeek and pcaps
- Syslog messages
123. Snort rule messages
- GPL: Older Snort rules can be downloaded from the Snort website, and
it is included in Security Onion, it is not Cisco Talos certified.
- ET: ruleset contains rules from multiple categories A set of ET rules is
included with Security Onion.
- VRT: rules are immediately available to subscribers, They are now
created and maintained by Cisco Talos.
124. Deterministic Analysis and Probabilistic Analysis
- Deterministic Analysis - For an exploit to be successful, all prior steps in
the exploit must also be successful. The cybersecurity analyst knows the
steps for a successful exploit.
- Probabilistic Analysis - Statistical techniques are used to determine the
probability that a successful exploit will occur based on the likelihood
that each step in the exploit will succeed
125. Core Components of ELK:
- Beats: Series of software plugins that send different types of data to the
Elasticsearch data stores.
- Logstash: Enables collection and normalization of network data into
data indexes that can be efficiently searched by Elasticsearch.
- Elasticsearch: An open-core platform for searching and analyzing an
organization’s data in near real time.
- Kibana: Provides a graphical interface to data that is compiled by
Elasticsearch
126. Data Normalization
- process of combining data from a number of sources into a common
format.
127. Workflow Management
- Workflows are the sequence of processes and procedures through
which work tasks are completed.
Hope you great success in your entire life, and to be at the highest level of paradise at hereafter.