Module 5 - Principles of Network Security
Module 5 - Principles of Network Security
ASSURANCE &
SECURITY 2
MODULE 5
PRINCIPLES OF NETWORK
SECURITY
OBJECTIVES
Upon completion of this module, the student would be able to:
▪ Risk
• Likelihood that a threat will exploit a vulnerability of an asset and result in an undesirable consequence.
There are four common ways to manage risk:
•Risk acceptance
•Risk avoidance
•Risk limitation
•Risk transfer
Note: A local exploit requires inside network access such as a user with an account on the network. A
remote exploit does not require an account on the network to exploit that network’s vulnerability.
Who is Attacking Our Network?
Hacker vs. Threat Actor
▪ White Hat Hackers
• Ethical hackers who use their programming skills for good, ethical, and legal
purposes.
• Perform penetration tests to discover vulnerabilities and report to developers
before exploitation.
▪ Grey Hat Hackers
• Commit crimes and do unethical things but not for personal gain or to cause
damage.
• May compromise network and then disclose the problem so the organization
can fix the problem.
▪ Black Hat Hackers
• Unethical criminals who violate security for personal gain, or for malicious
reasons, such as attacking networks.
Note: Threat actors is a term used to describe grey and black hat hackers.
Who is Attacking Our Network?
Evolution of Threat Actors
▪ Script Kiddies
• Inexperienced hackers running existing
tools and exploits, to cause harm, but
typically not for profit.
▪ State-Sponsored
• White or black hats who steal
government secrets, gather intelligence,
and sabotage networks.
• Targets are foreign governments,
terrorist groups, and corporations.
Who is Attacking Our Network?
Evolution of Threat Actors (Continuation)
▪ Cybercriminals
• Black hats stealing billions of dollars from
consumers and businesses.
▪ Hacktivists
• Grey hats who rally and protest against political
and social ideas.
• Post articles and videos to leak sensitive
information.
▪ Vulnerability Broker
• Discover exploits and report them to vendors,
sometimes for prizes or rewards.
Who is Attacking Our Network?
Cybercriminals
▪ Money-motivated threat actors.
▪ Buy, sell, and trade exploits, and
private information and intellectual
property.
▪ Steal from consumers, small
businesses, as well as large
enterprises and industries.
Who is Attacking Our Network?
Cybersecurity Tasks
▪ Develop good cybersecurity awareness.
▪ By categorizing network attacks, it is possible to address types of attacks rather than individual
attacks.
Common Network Attacks
Reconnaissance Attacks
▪ Also known as information gathering,
reconnaissance attacks perform unauthorized
discovery and mapping of systems, services, or
vulnerabilities.
▪ Analogous to a thief surveying a neighborhood by
going door-to-door pretending to sell something.
▪ Called host profiling when directed at an endpoint.
▪ Recon attacks precede intrusive access attacks or
DoS attack and employ the use of widely available
tools.
Common Network Attacks
Sample Reconnaissance Attacks
▪ Techniques used by threat actors:
• Perform an information query of a target - Threat actor is
looking for initial information about a target. Tools: Google
search, public information from DNS registries using dig,
nslookup, and whois.
• Initiate a ping sweep of the target networks - Threat actor
initiates a ping sweep of the target networks revealed by the
previous DNS queries to identify target network addresses.
Identifies which IP addresses are active and creation of logical
topology.
• Initiate a port scan of active IP addresses - Threat actor
initiates port scans on hosts identified by the ping sweep to
determine which ports or services are available. Port scanning
tools such as Nmap, SuperScan, Angry IP Scanner, and
NetScan Tools initiate connections to the target hosts by
scanning for ports that are open on the target computers.
Common Network Attacks
Access Attacks
▪ Access attacks exploit vulnerabilities in authentication services, FTP services, and web services to
retrieve data, gain access to systems, or to escalate access privileges.
• Emmett Dulaney and Chuck Easttom. CompTIA Security+ Study Guide: Exam SY0-501 7th Edition
• David L. Prowse (2018) Pearson. CompTIA Security+ SY0-501 Cert Guide (4th Edition)
• Omar Santos/ Joseph Muniz /Stefano De Crescenzo(June 17, 2017)CCNA Cyber Ops (SECFND #210-
250 and SECOPS #210-255)Official Cert Guide Library 1st Edition