Network Infrastructure and Risk Elements
Network Infrastructure and Risk Elements
October 17 – October 23
Networking Basics
SM 6369
What is a network
A Network is an environment constituted to allow machines to communicate. It consists of the following:
• The machines or devices communicating
• The medium of communication (cables, wireless, cellular)
• The devices facilitating (or protecting) the network
In an enterprise or organizational setting, some of the “machines” that need to communicate are used directly in
business operation. Others exist as part of the network to facilitate the communication. See examples below
Used Directly in Business Operation (Endpoints) Used to Facilitate Communication (Intermediary Devices)
o Computing devices o Routers – Routes data across the internet using the IP address
o Printers o Switches – Switches data to specific network segments based on MAC address
o Mobile Phones o Hubs – Broadcasts to all connected devices.
o Firewalls – Filters packets based on preconfigured rules
Device Identity
Every device or machine communicating on a network has two unique identifiers.
These devices require a network interface card or NIC to communicate with the rest of the network.
The two unique identifiers are a string of characters, usually a numbers or letters, with some method of
delimitation
For communication, devices on a network are identified by other devices using their IP address or MAC address.
In adversarial cyber attacks, devices are targeted using these addresses.
SM 6369
Data Identification
Data is transported over a network in packets of approximately 65,000 bytes. However, depending on the specific technology used, the exact size can vary.
Each packet is marked with a sequence number, and travels independently. The sequence number allows the packets to be reconstructed at the receiving
end.
Watch a demonstration how packets traverse the internet here.
A data packet has several parts. The two main parts are the Header and the Payload.
The header contains information about the source, destination and the sequence number.
Security Implications
Unencrypted data traversing a network can be intercepted manipulated
When a packet of information moves across the network, the router on the with malicious intent. This is tactic commonly in cyber attacks can trigger
network will examine the IP address portion of the packet and move the packet the following:
onto the network segment which contains the computer with the destination IP • Bypass certain security controls as the source IP now appears
address. Once on the correct segment, switches will look at the MAC address to legitimate
move the packet to the correct destination NIC. The CRC is error-checking • Elicit replies to be sent to rogue destination based on a false source IP
information. The destination NIC will look at the CRC to determine if the packet was • Redirect packets once the destination has been altered
corrupted during transit. If there is a problem with the packet, it will be re-
transmitted. - trustysec
SM 6369
Protocols
• An agreed upon set of rules with which connected devices communicate with each other.
• Bridge the gap between differences in software, hardware, and standards
• Enhance safe and easy operations with regards to communication
Services
• Programs or capabilities usually provided by the server operating system that are used to facilitate network operations
• Also used to manage, organize, and sometimes secure data moved and stored across a network
• Can be managed at the operating system level to improve security
Security Implications
Infiltration of ports and protocols can provide an adversary with malicious intent access to data, and services can be used by the adversary as tools to carry out this intent
SM 6369
Based on this, different types of attacks occur at different layers, and thus require
responses based on the layer at which they occur.
SM 6369
These represent the “security goals” of an organization with regards to cybersecurity, or what the organization tries to
protect about its systems and data.
Cyber Risk is based largely on the consequences of a cyber incident to an organization. The consequences could
be different, based on the type of organization and the type of threat.
Other elements such as Time of the year, Time of the day, available resources, and organizational culture could
also increase or decrease risk.
Managing Cyber Risk means addressing the risk elements by applying one of the following Risk Treatments.
• Acceptance
• Transference
• Elimination
• Mitigation
SM 6369
Threats –
Elements that are capable of exploiting vulnerabilities that exist in an organization’s information system
Risk –
The likelihood that a threat will exploit a vulnerability
A Vulnerability can exist without being a risk. This is possible if there is no threat that is willing and able to exploit it.
Vulnerabilities can be managed separately in a vulnerability management process. In this case, the existence of an active
threat is not necessarily considered.
SM 6369
Motivations
Hacktivism
Conducting cyber attacks for a cause
Nation-state Operations
Sponsored by national resources, usually for political reasons
Insiders - (espionage)
Conducted by members of an organization who already have access to systems and data
Financial gain
Perpetrators engage in malicious activity with extortion as a primary motivation