IntroCyberv2.1 Chp4 Instructor Supplemental Material
IntroCyberv2.1 Chp4 Instructor Supplemental Material
Organization
Instructor Materials
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2
Chapter 4 - Sections & Objectives (Cont.)
4.3 Cisco’s Approach to Cybersecurity
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3
4.1 Firewalls
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4
Firewalls Types
Firewall Types
Control or filter incoming or outgoing communications on a network or device
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6
Security Appliances
Security Appliances
Security appliances fall into these general categories:
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7
Detecting Attacks in Real Time
Detecting Attacks in Real Time
Zero-day attack
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9
Security Best Practices
Security Best Practices
Some published Security Best Practices:
• Perform Risk Assessment – Knowing the value of what you are protecting will help in justifying security
expenditures.
• Create a Security Policy – Create a policy that clearly outlines company rules, job duties, and expectations.
• Physical Security Measures – Restrict access to networking closets, server locations, as well as fire suppression.
• Human Resource Security Measures – Employees should be properly researched with background checks.
• Perform and Test Backups – Perform regular backups and test data recovery from backups.
• Maintain Security Patches and Updates – Regularly update server, client, and network device operating systems
and programs.
• Employ Access Controls – Configure user roles and privilege levels as well as strong user authentication.
• Regularly Test Incident Response – Employ an incident response team and test emergency response scenarios.
• Implement a Network Monitoring, Analytics and Management Tool - Choose a security monitoring solution that
integrates with other technologies.
• Implement Network Security Devices – Use next generation routers, firewalls, and other security appliances.
• Implement a Comprehensive Endpoint Security Solution – Use enterprise level antimalware and antivirus
software.
• Educate Users – Educate users and employees in secure procedures. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11
Botnet
Botnet
Botnet
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12
Kill Chain
The Kill Chain in Cyberdefense
Kill Chain is the stages of an information systems attack.
1. Reconnaissance – Gathers information
2. Weaponization - Creates targeted exploit
and malicious payload
3. Delivery - Sends the exploit and malicious
payload to the target
4. Exploitation – Executes the exploit
5. Installation - Installs malware and backdoors
6. Command and Control - Remote
control from a command and control channel
or server.
7. Action – Performs malicious actions
or additional attacks on other devices
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 13
Behavior-Based Security
Behavior-Based Security
Honeypots
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 14
NetFlow and Cyberattacks
Netflow
Gather information about data flowing through a network
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 15
4.3 Cisco’s Approach to
Cybersecurity
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 16
CSIRT
CSIRT
Computer Security Incident Response Team
• help ensure company, system, and data preservation by performing comprehensive investigations into
computer security incidents
• provides proactive threat assessment, mitigation planning, incident trend analysis, and security
architecture review
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 17
Security Playbook
Security Playbook
Collection of repeatable queries against security event data sources that lead to incident detection
and response
What does it need to accomplish?
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 18
Tools for Incident Prevention and Detection
Tools for Incident Prevention and Detection
SIEM – Security Information and Event Management
• Software that collects and analyzes security alerts, logs and other real time and historical data from
security devices on the network
DLP – Data Loss Prevention
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 19
IDS and IPS
IDS and IPS
IDS – Intrusion Detection System
• Snort
• Sourcefire (Cisco)
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 20