16.2.6 Lab - Research Network Security Threats
16.2.6 Lab - Research Network Security Threats
16.2.6 Lab - Research Network Security Threats
Noblefranca
SECTION: BSIT - 2105
Objectives
Background / Scenario
To defend a network against attacks, an administrator must identify external threats that
pose a danger to the network. Security websites can be used to identify emerging
threats and provide mitigation options for defending a network.
One of the most popular and trusted sites for defending against computer and network
security threats is SysAdmin, Audit, Network, Security (SANS). The SANS site provides
multiple resources, including a list of the top 20 Critical Security Controls for Effective
Cyber Defense and the weekly @Risk: The Consensus Security Alert newsletter. This
newsletter details new network attacks and vulnerabilities.
In this lab, you will navigate to and explore the SANS site, use the SANS site to identify
recent network security threats, research other websites that identify threats, and
research and present the details about a specific network attack
Part 1: Exploring the SANS Website
Search the internet for SANS. From the SANS home page, click on FREE Resources.
The CIS Critical Security Controls linked on the SANS website are the culmination of
a public-private partnership involving the Department of Defense (DoD), National
Security Association, Center for Internet Security (CIS), and the SANS Institute. The list
was developed to prioritize the cyber security controls and spending for DoD. It has
become the centerpiece for effective security programs for the United States
government. From the Resources menu, select Critical Security Controls, or similar.
The CIS Critical Security Controls document is hosted at the Center for Internet Security
(CIS) web site and requires free registration to access. There is a link on the CIS
Security Controls page at SANS to download the 2014 SANS Critical Security Controls
Poster, which provides a brief description of each control.
Select one of the Controls and list implementation suggestions for this control.
Highlight the Resources menu, select Newsletters. Briefly describe each of the three
newsletters available.
OUCH! is the world’s leading, free security awareness newsletter designed for
the common computer user. Published every month and in multiple languages,
each edition is carefully researched and developed by the SANS Securing The
Human team, SANS instructor subject matter experts, and team members of the
community. Each issue focuses on and explains a specific topic and actionable
steps people can take to protect themselves, their family and their organization.
Besides the SANS site, identify some other websites that provide recent security threat
information.
- Raspberry Robin Malware: Malware spreading through USB devices and internal
networks, enabling persistent attacks.
- Clop Ransomware: Exploiting file transfer software vulnerabilities to exfiltrate
sensitive data.
- APT Exploitation of SAML: Advanced Persistent Threat groups targeting
federated authentication systems to compromise enterprise cloud environments.
- Supply Chain Attacks: Attacks on software providers to infect downstream users,
such as the 3CX Trojan.
- Include keeping the operating system and applications up to date with patches
and service packs, using a personal firewall, configuring passwords to access the
system and bios, configuring screensavers to timeout and requiring a password,
protecting important files by making them read-only, and encrypting confidential
files and backup files for safe keeping.
2. What are some important steps that organizations can take to protect their
resources?