SlideShare a Scribd company logo
1 of 93
Download to read offline
FRSecure 2016 CISSP
Mentor Program
EVAN FRANCEN, PRESIDENT & CO-FOUNDER - FRSECURE
CLASS SESSION #10
CISSP Mentor Program Session #10
Domain 4: Communication and Network Security - Review
• Network Scanning Tools
• Secure Communications
• Wireless Local Area Networks
• Remote Access
We finished Domain 4!
CISSP Mentor Program Session #10
Domain 5: Identity and Access Management - Review
• Cornerstone access control concepts
• Access control models
• Authentication Methods
• Type 1
• Type 2
• Type 3
• Single Sign-On (SSO)
Now for the Domain 4 Quiz…
CISSP Mentor Program Session #10
Domain 4: Communication and Network Security Quiz Review
CISSP Mentor Program Session #10
Domain 4: Communication and Network Security Quiz Review
1. Which protocol should be used for an audio streaming server, where
some loss is acceptable?
a. IP
b. ICMP
c. TCP
d. UDP
D
CISSP Mentor Program Session #10
Domain 4: Communication and Network Security Quiz Review
2. What network topology uses fixed-length cells to carry data?
a. ARCNET
b. ATM
c. Ethernet
d. FDDI
B
CISSP Mentor Program Session #10
Domain 4: Communication and Network Security Quiz Review
3. Secure Shell (SSH) servers listen on what port and protocol?
a. TCP port 20
b. TCP port 21
c. TCP port 22
d. TCP port 23
C
CISSP Mentor Program Session #10
Domain 4: Communication and Network Security Quiz Review
4. What network cable type can transmit the most data at the longest
distance?
a. Coaxial
b. Fiber optic
c. Shielded Twisted Pair (STP)
d. Unshielded Twisted Pair (UTP)
B
CISSP Mentor Program Session #10
Domain 4: Communication and Network Security Quiz Review
5. Which device operates at Layer 2 of the OSI model?
a. Hub
b. Firewall
c. Switch
d. Router
C
CISSP Mentor Program Session #10
Domain 4: Communication and Network Security Quiz Review
6. What are the names of the OSI model layers, in order from bottom to top?
a. Physical, Data Link, Transport, Network, Session, Presentation,
Application
b. Physical, Network, Data Link, Transport, Session, Presentation,
Application
c. Physical, Data Link, Network, Transport, Session, Presentation,
Application
d. Physical, Data Link, Network, Transport, Presentation, Session,
Application
C
CISSP Mentor Program Session #10
Domain 4: Communication and Network Security Quiz Review
7. Which of the following authentication protocols uses a three-way
authentication handshake?
a. CHAP
b. EAP
c. Kerberos
d. PAP
A
CISSP Mentor Program Session #10
Domain 4: Communication and Network Security Quiz Review
8. Restricting Bluetooth device discovery relies on the secrecy of what?
a. MAC address
b. Symmetric key
c. Private key
d. Public key
B
CISSP Mentor Program Session #10
Domain 4: Communication and Network Security Quiz Review
9. Which wireless security protocol is also known as the RSN (Robust
Security Network), and implements the full 802.11i standard?
a. AES
b. WEP
c. WPA
d. WPA2
D
CISSP Mentor Program Session #10
Domain 4: Communication and Network Security Quiz Review
10. What is the difference between a stateful firewall and a proxy firewall?
a. Stateful firewalls have state, proxy firewalls do not
b. Proxy firewalls have state, stateful firewalls do not
c. Stateful firewalls terminate connections, proxy firewalls do not
d. Proxy firewalls terminate connections, stateful firewalls do not
D
CISSP Mentor Program Session #10
Domain 4: Communication and Network Security Quiz Review
11. Which transmission mode is supported by both HDLC and SDLC?
a. Asynchronous Balanced Mode (ABM)
b. Asynchronous Response Mode (ARM)
c. Normal Balanced Mode (NBM)
d. Normal Response Mode (NRM)
D
CISSP Mentor Program Session #10
Domain 4: Communication and Network Security Quiz Review
12. What is the most secure type of EAP?
a. EAP-TLS
b. EAL-TLLS
c. LEAP
d. PEAP
A
CISSP Mentor Program Session #10
Domain 4: Communication and Network Security Quiz Review
13. What WAN protocol has no error recovery, relying on higher level
protocols to provide reliability?
a. ATM
b. Frame Relay
c. SMDS
d. X.25
B
CISSP Mentor Program Session #10
Domain 4: Communication and Network Security Quiz Review
14. What is the most secure type of firewall?
a. Packet filter
b. Stateful firewall
c. Circuit-level proxy firewall
d. Application-layer proxy firewall
D
CISSP Mentor Program Session #10
Domain 4: Communication and Network Security Quiz Review
15. Accessing an IPv6 network via an IPv4 network is called what?
a. CIDR
b. NAT
c. Translation
d. Tunneling
D
CISSP Mentor Program Session #10
Domain 5: Identity and Access Management
Single Sign-On (SSO)
As outlined in the IBM article, “Build and Implement a Single Sign-On Solution” by Chris Dunne,
September 30, 2003, SSO is an important access control and can offer the following benefits:
• “Improved user productivity. Users are no longer bogged down by multiple logins and they are not
required to remember multiple IDs and passwords. Also, support personnel answer fewer requests
to reset forgotten passwords.”
• “Improved developer productivity. SSO provides developers with a common authentication
framework. In fact, if the SSO mechanism is independent, then developers do not have to worry
about authentication at all. They can assume that once a request for an application is accompanied
by a username, then authentication has already taken place.”
• “Simplified administration. When applications participate in a single sign-on protocol, the
administration burden of managing user accounts is simplified. The degree of simplification depends
on the applications since SSO only deals with authentication. So, applications may still require user-
specific attributes (such as access privileges) to be set up.”
CISSP Mentor Program Session #9
Domain 5: Identity and Access Management
Single Sign-On (SSO)
The disadvantages of SSO are listed below and must be considered before implementing
SSO on a system:
• “Difficult to retrofit. An SSO solution can be difficult, time consuming, and expensive
to retrofit to existing applications.”
• “Unattended desktop. Implementing SSO reduces some security risks, but increases
others. For example, a malicious user could gain access to a user’s resources if the
user walks away from his machine and leaves it logged in. Although this is a problem
with security in general, it is worse with SSO because all authorized resources are
compromised. At least with multiple logons, the user may only be logged into one
system at the time and so only one resource is compromised.”
• “Single point of attack. With single sign-on, a single, central authentication service is
used by all applications. This is an attractive target for hackers who may decide to
carry out a denial of service attack.”
CISSP Mentor Program Session #10
Domain 5: Identity and Access
Management
Access Provisioning Lifecycle
• After an access control model has been
chosen.
• Identity Lifecycle – provisioning,
maintenance
(passwords/rights/privileges), changes,
re-provisioning, reconciliation/audit
CISSP Mentor Program Session #10
Domain 5: Identity and Access Management
Access Provisioning Lifecycle
IBM describes the following identity lifecycle rules:
• “Password policy compliance checking
• Notifying users to change their passwords before they expire
• Identifying life cycle changes such as accounts that are inactive for more than 30
consecutive days
• Identifying new accounts that have not been used for more than 10 days following their
creation
• Identifying accounts that are candidates for deletion because they have been
suspended for more than 30 days
• When a contract expires, identifying all accounts belonging to a business partner or
contractor’s employees and revoking their access rights”
CISSP Mentor Program Session #10
Domain 5: Identity and Access Management
User Entitlement, Access Review and Audit
• Authorization creep
• occurs when subjects not only maintain old access rights but gain new ones as they
move from one role to another within an organization
• User rights (or entitlements) must be routinely reviewed
CISSP Mentor Program Session #10
Domain 5: Identity and Access Management
Single Sign-On (SSO)
• Identity as a service (IDaaS) - Gartner Inc., divides IDaaS services into
two categories:
• Web access software for cloud-based applications such as software as a service
(SaaS)
• Web-architected applications; and cloud-delivered legacy identity management
services.
• LDAP – Lightweight Directory Access Protocol – common, open
protocol for interfacing and querying directory service information over
a network. TCP/UDP port 389. LDAPS (LDAP over TLS); TCP 636 & 3269
CISSP Mentor Program Session #10
Domain 5: Identity and Access Management
Single Sign-On (SSO) - Kerberos
• A third-party authentication service that may be used to support Single
Sign-On
• Kerberos (http://www.kerberos.org/) was the name of the three-
headed dog that guarded the entrance to Hades (also called Cerberus)
in Greek mythology
• The three heads of the mythical Kerberos were meant to signify the
three “A”s of AAA systems: authentication, authorization, and
accountability
• The original Kerberos mainly provided authentication
CISSP Mentor Program Session #10
Domain 5: Identity and Access Management
Single Sign-On (SSO) - Kerberos
• Kerberos FAQ (see http://www.faqs.org/faqs/kerberos-faq/user/)
states:
• Kerberos is a network authentication system for use on physically insecure
networks
• Based on the key distribution model presented by Needham and Schroeder
• Allows entities communicating over networks to prove their identity to each other
while preventing eavesdropping or replay attacks
• Provides for data stream integrity (detection of modification) and secrecy
(preventing unauthorized reading) using cryptography systems such as DES (Data
Encryption Standard)
CISSP Mentor Program Session #10
Domain 5: Identity and Access Management
Single Sign-On (SSO) - Kerberos
• Uses secret key encryption
• Provides mutual authentication of both clients and servers
• Protects against network sniffing and replay attacks
• Current version of Kerberos is version 5, described by RFC 4120 (http://www.ietf.org/rfc/rfc4120.txt)
• Kerberos has the following components:
• Principal: Client (user) or service
• Realm: A logical Kerberos network
• Ticket: Data that authenticates a principal’s identity
• Credentials: a ticket and a service key
• KDC: Key Distribution Center, which authenticates principals
• TGS: Ticket Granting Service
• TGT: Ticket Granting Ticket
• C/S: Client Server, regarding communications between the two
CISSP Mentor Program Session #10
Domain 5: Identity and Access Management
Single Sign-On (SSO) - Kerberos
CISSP Mentor Program Session #10
Domain 5: Identity and Access Management
Single Sign-On (SSO) - Kerberos
• Strengths:
• Provides mutual authentication of client and server
• If a rogue KDC pretended to be a real KDC, it would not have access to keys
• mitigates replay attacks (where attackers sniff Kerberos credentials and replay them
on the network) via the use of timestamps
CISSP Mentor Program Session #10
Domain 5: Identity and Access Management
Single Sign-On (SSO) - Kerberos
• Weaknesses:
• KDC stores the plaintext keys of all principals (clients and servers)
• A compromise of the KDC (physical or electronic) can lead to the compromise of every key in the
Kerberos realm
• KDC and TGS are single points of failure: if they go down, no new credentials can be issued
• Replay attacks are still possible for the lifetime of the authenticator (An attacker could sniff an
authenticator, launch a denial-of-service attack against the client, and then assume or spoof the client’s
IP address)
• Any user may request a session key for another user
• Kerberos does not mitigate a malicious local host: plaintext keys may exist in memory or cache
CISSP Mentor Program Session #10
Domain 5: Identity and Access Management
Single Sign-On (SSO) - SESAME
• Secure European System for Applications in a Multi-vendor Environment
• A single sign-on system that supports heterogeneous environments
• Can be thought of as a sequel of sorts to Kerberos
• It addresses one of the biggest weaknesses in Kerberos: the plaintext storage of
symmetric keys
• Uses Privilege Attribute Certificates (PACs) in place of Kerberos’ tickets
• More information on SESAME is available at:
https://www.cosic.esat.kuleuven.be/sesame/
CISSP Mentor Program Session #10
Domain 5: Identity and Access Management
Access Control Protocols And Frameworks - RADIUS
• Remote Authentication Dial In User Service (RADIUS) protocol
• A third-party authentication system
• Described in RFCs 2865 and 2866
• Uses the User Datagram Protocol (UDP) ports 1812 (authentication) and 1813
(accounting)
• Formerly used the (unofficially assigned) ports of 1645 and 1646 for the same respective
purposes; some continue to use those ports
• Considered an “AAA” system
• Authenticates a subject’s credentials against an authentication database
• Authorizes users by allowing specific users’ access to specific data objects
• Accounts for each data session by creating a log entry for each connection made
CISSP Mentor Program Session #10
Domain 5: Identity and Access Management
Access Control Protocols And Frameworks - RADIUS
• Request and response data is carried in Attribute Value Pairs (AVPs)
• According to RFC 2865 (http://tools.ietf.org/html/rfc2865), RADIUS supports the following
codes:
• Access-Request
• Access-Accept
• Access-Reject
• Accounting-Request
• Accounting-Response
• Access-Challenge
• Status-Server (experimental)
• Status-Client (experimental)
CISSP Mentor Program Session #10
Domain 5: Identity and Access Management
Access Control Protocols And Frameworks - RADIUS
CISSP Mentor Program Session #10
Domain 5: Identity and Access Management
Access Control Protocols And Frameworks - Diameter
• RADIUS’ successor
• Designed to provide an improved Authentication, Authorization, and Accounting (AAA)
framework
• Also uses Attribute Value Pairs, but supports many more:
• RADIUS uses 8 bits for the AVP field (allowing 256 total possible AVPs)
• Diameter uses 32 bits for the AVP field (allowing billions of potential AVPs)
• Uses a single server to manage policies for many services, as opposed to RADIUS which
requires many servers to handle all of the secure connection protocols
• Provides AAA functionality
• More reliable by using the Transmission Control Protocol (TCP)
• Currently a draft standard, first described by RFC 3588 (http://tools.ietf.org/html/rfc3588)
CISSP Mentor Program Session #10
Domain 5: Identity and Access Management
Access Control Protocols And Frameworks - TACACS and TACACS+
• Terminal Access Controller Access Control System (TACACS)
• Centralized access control system that requires users to send an ID and static (reusable)
password for authentication
• TACACS uses UDP port 49 (and may also use TCP)
• Reusable passwords have security vulnerability: the improved TACACS+ provides better
password protection by allowing two-factor strong authentication
• TACACS+ is not backwards compatible with TACACS
• TACACS+ uses TCP port 49 for authentication with the TACACS+ server
• The actual function of authentication is similar to RADIUS
• RADIUS only encrypts the password (leaving other data, such as username, unencrypted);
TACACS+ encrypts all data below the TACACS+ header
CISSP Mentor Program Session #10
Domain 5: Identity and Access Management
Access Control Protocols And Frameworks - TACACS and TACACS+
• Terminal Access Controller Access Control System (TACACS)
• Centralized access control system that requires users to send an ID and static (reusable)
password for authentication
• TACACS uses UDP port 49 (and may also use TCP)
• Reusable passwords have security vulnerability: the improved TACACS+ provides better
password protection by allowing two-factor strong authentication
• TACACS+ is not backwards compatible with TACACS
• TACACS+ uses TCP port 49 for authentication with the TACACS+ server
• The actual function of authentication is similar to RADIUS
• RADIUS only encrypts the password (leaving other data, such as username, unencrypted);
TACACS+ encrypts all data below the TACACS+ header
CISSP Mentor Program Session #10
Domain 5: Identity and Access Management
PAP and CHAP
• Password Authentication Protocol (PAP)
• Defined by RFC 1334 (http://tools.ietf.org/html/rfc1334#section-2)
• Not a strong authentication method
• User password and it is sent across the network in clear text
• When received by the PAP server, it is authenticated and validated
• Challenge Handshake Authentication Protocol (CHAP)
• Defined by RFC 1994 (http://www.faqs.org/rfcs/rfc1994.html)
• Provides protection against playback attacks
• Uses a central location that challenges remote users
• “CHAP depends upon a ‘secret’ known only to the authenticator and the peer. The secret is not sent over the
link. Although the authentication is only one-way, by negotiating CHAP in both directions the same secret set
may easily be used for mutual authentication.”
• A sniffer that views the entire challenge/response process will not be able to determine the shared secret
CISSP Mentor Program Session #10
Domain 5: Identity and Access Management
Access Control Protocols And Frameworks - Microsoft Active Directory
Domains
• Microsoft Windows Active Directory uses the concept of domains as the primary means to
control access
• For authentication purposes, Microsoft bases their authentication of trust relationships
on RFC 1510, the Kerberos Authentication Protocol, and it is fully integrated into
Microsoft Windows operating systems since Windows 2000.
• Each domain has a separate authentication process and space
• Each domain may contain different users and different network assets and data objects
• If a two-way trust between domains is created, then the users and data objects from each
domain can be accessed by groups belonging to either domain.
CISSP Mentor Program Session #10
Domain 5: Identity and Access Management
Access Control Protocols And Frameworks - Microsoft Active Directory
Domains
As stated by Microsoft,
• “How a specific trust passes authentication requests depends on how it is configured;
trust relationships can be one-way, providing access from the trusted domain to
resources in the trusting domain, or two way, providing access from each domain to
resources in the other domain. Trusts are also either nontransitive, in which case trust
exists only between the two trust partner domains, or transitive, in which case trust
automatically extends to any other domains that either of the partners trusts.”
• Microsoft trust relationships fall into two categories; nontransitive and transitive.
Nontransitive trusts only exist between two trust partners. Transitive trusts exist between
two partners and all of their partner domains. For example, if A trusts B, in a transitive
trust, A will trust B and all of B’s trust partners.
CISSP Mentor Program Session #10
Domain 5: Identity and Access Management
DONE!
On to Domain #6: Security Assessment and Testing
A new domain…
CISSP Mentor Program Session #10
Domain 6: Security Assessment and Testing
• Assessing Access Control
• Software Testing Methods
Unique Terms & Definitions:
• Dynamic Testing – Tests code while executing it
• Fuzzing – A type of black box testing that submits random, malformed data as inputs
into software programs to determine if they will crash
• Penetration Testing – Authorized attempt to break into an organization’s physical or
electronic perimeter (and sometimes both)
• Static Testing – Tests code passively: the code is not running.
• Synthetic Transactions – Also called synthetic monitoring: involves building scripts or
tools that simulate activities normally performed in an application
CISSP Mentor Program Session #10
Domain 6: Security Assessment and Testing
Penetration Testing - Black Hats and White Hats
• Black hat attackers are malicious hackers, sometimes called crackers.
• “Black” derives from villains in fiction: Darth Vader wore all black
• Lack ethics, sometimes violate laws, and break into computer systems with malicious intent, and may violate the
confidentiality, integrity, or availability of organization’s systems and data
• White hat hackers are the “good guys”
• Professional penetration testers who break into systems with permission
• Malware researches who research malicious code to provide better understanding and ethically disclose vulnerabilities
to vendors, etc.
• Also known as ethical hackers; they follow a code of ethics and obey laws
• Gray hat hackers fall somewhere between black and white hats
• Exploits a security weakness in a computer system or product in order to bring the weakness to the attention of the
owners
• Unlike a black hat, a gray hat acts without malicious intent
• The goal of a gray hat is to improve system and network security
CISSP Mentor Program Session #10
Domain 6: Security Assessment and Testing
Penetration Testing
• A penetration tester is a white hat hacker who receives authorization to attempt to break into an
organization’s physical or electronic perimeter (and sometimes both)
• Penetration tests (called “pen tests” for short) are designed to determine whether black hat hackers
could do the same
• A narrow test
• Penetration tests may include the following tests:
• Network (Internet)
• Network (internal or DMZ)
• Wardialing
• Wireless
• Physical (attempt to gain entrance into a facility or room)
• Wireless
• Network attacks may leverage client-side attacks, server-side attacks, or Web application attacks
CISSP Mentor Program Session #10
Domain 6: Security Assessment and Testing
Penetration Testing
• War dialing uses modem to dial a series of phone numbers, looking for an answering
modem carrier tone (the penetration tester then attempts to access the answering
system); the name derives from the 1983 movie WarGames
• Social engineering uses the human mind to bypass security controls
• May be used in combination with many types of attacks, especially client-side attacks or physical tests
• An example of a social engineering attack combined with a client-side attack is emailing malware with a
Subject line of “Category 5 Hurricane is about to hit Florida!”
• A physical social engineering attack (used to tailgate an authorized user into a building)
CISSP Mentor Program Session #10
Domain 6: Security Assessment and Testing
Penetration Testing
• A zero-knowledge (also called black box) test is “blind”; the penetration tester begins
with no external or trusted information, and begins the attack with public
information only
• A full-knowledge test (also called crystal-box) provides internal information to the
penetration tester, including network diagrams, policies and procedures, and
sometimes reports from previous penetration testers
• Partial-knowledge tests are in between zero and full knowledge: the penetration
tester receives some limited trusted information
• Most penetration tests have a scope that includes a limitation on the time spent
conducting the test
CISSP Mentor Program Session #10
Domain 6: Security Assessment and Testing
Penetration Testing Tools and Methodology
• Penetration testing tools:
• Open source Metasploit (http://www.metasploit.org)
• Closed source Core Impact (http://www.coresecurity.com)
and Immunity Canvas (http://www.immunitysec.com)
• Top 125 Network Security Tools (http://sectools.org/)
• Custom tools
CISSP Mentor Program Session #10
Domain 6: Security Assessment and Testing
Penetration Testing Tools and Methodology
• Penetration testers use the following methodology:
• Planning
• Reconnaissance
• Scanning (also called enumeration)
• Vulnerability assessment
• Exploitation
• Reporting
• Black hat hackers typically follow a similar methodology
• Black hats will also cover their tracks (erase logs and other signs of
intrusion), and frequently violate system integrity by installing back
doors (in order to maintain access)
CISSP Mentor Program Session #10
Domain 6: Security Assessment and Testing
Assuring Confidentiality, Data Integrity, and System Integrity
• Penetration testers must ensure the confidentiality of any sensitive data that
is accessed during the test
• Testers will often request that a dummy file containing no regulated or
sensitive data (sometimes called a flag) be placed in the same area of the
system as the credit card data, and protected with the same permissions
• If the tester can read and/or write to that file, then they prove they could
have done the same to the credit card data
• Penetration testers must be sure to ensure the system integrity and data
integrity of their client’s systems
• The risk of encountering signs of a previous or current successful malicious
attack (discuss this before starting a test)
CISSP Mentor Program Session #10
Domain 6: Security Assessment and Testing
Vulnerability Testing
• Vulnerability scanning (also called vulnerability testing) scans a
network or system for a list of predefined vulnerabilities such as
system misconfiguration, outdated software, or a lack of patching
• Nessus (http://www.nessus.org), OpenVAS
(http://www.openvas.org), Qualys, and Rapid 7/Nexpose
• Missing patches and configuration errors
• Common Vulnerability Scoring System (CVSS) -
https://nvd.nist.gov/cvss.cfm
CISSP Mentor Program Session #10
Domain 6: Security Assessment and Testing
Security Audits
• Testing against a published standard
• PCI-DSS compliance
• SOC 2, Type 1 and SOC 2, Type 2
• Purpose is to validate/verify that an organization meets the
requirements as stated in the published standard
CISSP Mentor Program Session #10
Domain 6: Security Assessment and Testing
Security Assessments
• A holistic approach to assessing the effectiveness of access control
• Broad scope
• Security assessments view many controls across multiple domains, and may
include the following:
• Policies, procedures, and other administrative controls
• Assessing the real world-effectiveness of administrative controls
• Change management
• Architectural review
• Penetration tests
• Vulnerability assessments
• Security audits
CISSP Mentor Program Session #10
Domain 6: Security Assessment and Testing
Security Assessments
• Key words… “assessing the effectiveness”
• Where there are gaps in control (weakness/vulnerability), what
are the applicable threats?
• Vulnerabilities + Threats = Likelihoods & Impacts = RISK
• FRSecure specializes in assessments – FISA™
CISSP Mentor Program Session #10
Domain 6: Security Assessment and Testing
Security Assessments
• FRSecure specializes in assessments – FISA™ is at our core.
CISSP Mentor Program Session #10
Domain 6: Security Assessment and Testing
Internal and 3rd-Party Audits
• Internal audit
• Structured audits – external audience, validate compliance, etc.
• Unstructured audits – internal audience, improve security, etc.
• 3rd-Party audits
• Experts (hopefully)
• Adds credibility
• Teach
CISSP Mentor Program Session #10
Domain 6: Security Assessment and Testing
Security Audit Logs
• According to “Five mistakes of Log Analysis” by Anton Chuvakin (see
http://www.computerworld.com/s/article/96587/Five_mistakes_of_lo
g_analysis), audit record management typically faces five distinct
problems:
• Log are not reviewed on a regular and timely basis.
• Audit logs and audit trails are not stored for a long enough time period.
• Logs are not standardized or viewable by correlation toolsets—they are only
viewable from the system being audited.
• Log entries and alerts are not prioritized.
• Audit records are only reviewed for the “bad stuff.”
CISSP Mentor Program Session #10
Domain 6: Security Assessment and Testing
Security Audit Logs
• Reviewing security audit logs within an IT system is one of the easiest ways to verify that
access control mechanisms are performing adequately
• Reviewing audit logs is primarily a detective control
• According to NIST Special Publication 800-92 (http://csrc.nist.gov/publications/nistpubs/800-
92/SP800-92.pdf), the following log types should be collected:
• Network Security Software/Hardware:
• Antivirus logs
• IDS/IPS logs
• Remote Access Software (such as VPN logs)
• Web proxy
• Vulnerability management
• Authentication servers
• Routers and firewalls
CISSP Mentor Program Session #10
Domain 6: Security Assessment and Testing
Security Audit Logs
• According to NIST Special Publication 800-92
(http://csrc.nist.gov/publications/nistpubs/800-92/SP800-92.pdf), the
following log types should be collected:
• Operating System:
• System events
• Audit records
• Applications
• Client requests and server responses
• Usage information
• Significant operational actions
CISSP Mentor Program Session #10
Domain 6: Security Assessment and Testing
Security Audit Logs – Centralized Logging
• Assists in log retention (sufficient for legal/regulatory compliance
and investigation)
• Assists in log protection (integrity & availability)
• SIEM
• Log protection
• Log aggregation
• Log correlation
• Dashboard reporting
CISSP Mentor Program Session #10
Domain 6: Security Assessment and Testing
Software Testing Methods
• Static testing tests the code passively: the code is not running. This includes walkthroughs,
syntax checking, and code reviews.
• Dynamic testing tests the code while executing it.
• White box software testing gives the tester access to program source code, data structures,
variables, etc.
• Black box testing gives the tester no internal details: the software is treated as a black box that
receives inputs.
• Traceability Matrix (sometimes called a Requirements Traceability Matrix, or RTM) can be used
to map customer’s requirements to the software testing plan: it “traces” the “requirements,”
and ensures that they are being met.
• Fuzzing (also called fuzz testing) is a type of black box testing that enters random, malformed
data as inputs into software programs to determine if they will crash.
• Combinatorial software testing is a black-box testing method that seeks to identify and test all
unique combinations of software inputs.
CISSP Mentor Program Session #10
Domain 6: Security Assessment and Testing
Software Testing Methods
• Static testing tests the code passively: the code is not running. This
includes walkthroughs, syntax checking, and code reviews.
• analysis of computer software that is performed without actually
executing programs
• In most cases the analysis is performed on some version of the source
code, and in the other cases, some form of the object code
• List of tools for static code analysis
(https://en.wikipedia.org/wiki/List_of_tools_for_static_code_analysis)
CISSP Mentor Program Session #10
Domain 6: Security
Assessment and
Testing
Software Testing
Methods
• Traceability Matrix
(or Requirements
Traceability Matrix
or RTM)
CISSP Mentor Program Session #10
Domain 6: Security Assessment and Testing
Software Testing Levels
• Unit Testing: Low-level tests of software components, such as
functions, procedures or objects
• Installation Testing: Testing software as it is installed and first operated
• Integration Testing: Testing multiple software components as they are
combined into a working system. Subsets may be tested, or Big Bang
integration testing tests all integrated software components
• Regression Testing: Testing software after updates, modifications, or
patches
• Acceptance Testing: testing to ensure the software meets the
customer’s operational requirements. When this testing is done
directly by the customer, it is called User Acceptance Testing.
CISSP Mentor Program Session #10
Domain 6: Security Assessment and Testing
Fuzzing
• Black box testing that enters random, malformed data as inputs into
software programs to determine if they will crash.
• Typical causes are boundary checking issues, leading to possible buffer
overflows
• Typically automated, repeatedly presenting random input strings as
command line switches, environment variables, and program inputs
attack
• List of good fuzzers; http://sectools.org/tag/fuzzers/.
• Burp Suite https://portswigger.net/burp/
CISSP Mentor Program Session #10
Domain 6: Security Assessment and Testing
Other Software Testing Terms
• Misuse Case Testing - derived from and is the inverse of use case
testing; describes the process of executing a malicious act against a
system, while use case can be used to describe any action taken by the
system
• Test Coverage Analysis
• Interface Testing – testing of all interfaces exposed by the application.
• Combinatorial software testing - a black-box testing method that seeks
to identify and test all unique combinations of software inputs.
CISSP Mentor Program Session #10
Domain 6: Security Assessment and Testing
DONE!
On to Domain #7: Security Operations
Adomain…
CISSP Mentor Program Session #10
Domain #7: Security Operations
• Administrative Security
• Forensics
• Incident Response Management
• Operational Preventive and Detective Controls
• Asset Management
• Continuity of Operations
• BCP and DRP Overview and Process
• Developing a BCP/DRP
• Backups and Availability
• DRP Testing, Training and Awareness
• Continued BCP/DRP Maintenance
• Specific BCP/DRP Frameworks
CISSP Mentor Program Session #10
Domain #7: Security Operations
Unique Terms and Definitions
• Business Continuity Plan (BCP)—a long-term plan to ensure the
continuity of business operations
• Collusion—An agreement between two or more individuals to subvert
the security of a system
• Continuity of Operations Plan (COOP)—a plan to maintain operations
during a disaster.
• Disaster—any disruptive event that interrupts normal system
operations
• Disaster Recovery Plan (DRP)—a short-term plan to recover from a
disruptive event
CISSP Mentor Program Session #10
Domain #7: Security Operations
Unique Terms and Definitions
• Mean Time Between Failures (MTBF)—quantifies how long a new or
repaired system will run on average before failing
• Mean Time to Repair (MTTR)—describes how long it will take to
recover a failed system
• Mirroring—Complete duplication of data to another disk, used by some
levels of RAID.
• Redundant Array of Inexpensive Disks (RAID)—A method of using
multiple disk drives to achieve greater data reliability, greater speed, or
both
• Striping—Spreading data writes across multiple disks to achieve
performance gains, used by some levels of RAID
CISSP Mentor Program Session #10
Domain #7: Security Operations
Administrative security
• Administrative Security provides the means to control people's
operational access to data
Least Privilege or Minimum Necessary Access
• Dictates that persons have no more than the access that is strictly
required for the performance of their duties
• May also be referred to as the principle of minimum necessary
access
• Discretionary Access Control (DAC) – most often applicable
CISSP Mentor Program Session #10
Domain #7: Security Operations
Need to know
• Mandatory Access Control (MAC)
• Access determination is based upon clearance levels of subjects
and classification levels of objects
• An extension to the principle of least privilege in MAC
environments is the concept of compartmentalization:
• A method for enforcing need to know goes beyond the reliance upon
clearance level and necessitates simply that someone requires access to
information.
CISSP Mentor Program Session #10
Domain #7: Security Operations
Separation of Duties
• Prescribes that multiple people are required to complete critical
or sensitive transactions
• Goal of separation of duties is to ensure that in order for
someone to be able to abuse their access to sensitive data or
transactions; they must convince another party to act in concert
• Collusion is the term used for the two parties conspiring to undermine the security
of the transaction
CISSP Mentor Program Session #10
Domain #7: Security Operations
Rotation of Duties/Job Rotation
• Also known as job rotation or rotation of responsibilities
• Provides a means to help mitigate the risk associated with any one individual having
too many privileges
• Requires that critical functions or responsibilities are not continuously performed by
the same single person without interruption
• “hit by a bus” or “win the lottery” scenario
Exam Warning: Though job or responsibility rotation is an important control, this, like
many other controls, is often compared against the cost of implementing the control.
Many organizations will opt for not implementing rotation of duties because of the cost
associated with implementation. For the exam, be certain to appreciate that cost is
always a consideration, and can trump the implementation of some controls.
CISSP Mentor Program Session #10
Domain #7: Security Operations
Mandatory Leave/Forced Vacation
• Also known as forced vacation
• Can identify areas where depth of coverage is lacking
• Can also help discover fraudulent or suspicious behavior
• Knowledge that mandatory leave is a possibility might deter some
individuals from engaging in the fraudulent behavior in the first
place
CISSP Mentor Program Session #10
Domain #7: Security Operations
Non-Disclosure Agreement
• A work-related contractual agreement that ensures that, prior to
being given access to sensitive information or data, an individual
or organization appreciates their legal responsibility to maintain
the confidentiality of sensitive information.
• Often signed by job candidates before they are hired, as well as
consultants or contractors
• Largely a directive control
CISSP Mentor Program Session #10
Domain #7: Security Operations
Background Checks
• Also known as background investigations or preemployment screening
• Majority of background investigations are performed as part of a
preemployment screening process
• The sensitivity of the position being filled or data to which the individual will
have access strongly determines the degree to which this information is
scrutinized and the depth to which the investigation will report
• Ongoing, or postemployment, investigations seek to determine whether the
individual continues to be worthy of the trust required of their position
• Background checks performed in advance of employment serve as a
preventive control while ongoing repeat background checks constitute a
detective control and possibly a deterrent.
CISSP Mentor Program Session #10
Domain #7: Security Operations
Privilege Monitoring
• Heightened privileges require both greater scrutiny and more
thoughtful controls
• Some of the job functions that warrant greater scrutiny include:
account creation/modification/deletion, system reboots, data
backup, data restoration, source code access, audit log access,
security configuration capabilities, etc.
CISSP Mentor Program Session #10
Domain #7: Security Operations
Digital Forensics
• Provides a formal approach to dealing with investigations and evidence
with special consideration of the legal aspects of the process
• Forensics is closely related to incident response
• Main distinction between forensics and incident response is that forensics is
evidence-centric and typically more closely associated with crimes, while incident
response is more dedicated to identifying, containing, and recovering from security
incidents
• The forensic process must preserve the “crime scene” and the
evidence in order to prevent unintentionally violating the integrity of
either the data or the data's environment
CISSP Mentor Program Session #10
Domain #7: Security Operations
Digital Forensics
• Prevent unintentional modification of the system
• Antiforensics makes forensic investigation difficult or impossible
• One method is malware that is entirely memory-resident, and not installed on the disk drive. If an
investigator removes power from a system with entirely memory-resident malware, all volatile
memory including RAM is lost, and evidence is destroyed.
• Valuable data is gathered during the live forensic capture
• The main source of forensic data typically comes from binary images of secondary
storage and portable storage devices such as hard disk drives, USB flash drives, CDs,
DVDs, and possibly associated cellular phones and mp3 players
• A binary or bit stream image is used because an exact replica of the original data is
needed
• Normal backup software will only capture the active partitions of a disk, and only
that data which is marked as allocated
CISSP Mentor Program Session #10
Domain #7: Security Operations
Digital Forensics
The four types of data that exist:
• Allocated space—portions of a disk partition which are marked as
actively containing data.
• Unallocated space—portions of a disk partition that do not contain
active data. This includes memory that has never been allocated, and
previously allocated memory that has been marked unallocated. If a
file is deleted, the portions of the disk that held the deleted file are
marked as unallocated and available for use.
CISSP Mentor Program Session #10
Domain #7: Security Operations
Digital Forensics
The four types of data that exist:
• Slack space—data is stored in specific size chunks known as clusters. A cluster
is the minimum size that can be allocated by a file system. If a particular file,
or final portion of a file, does not require the use of the entire cluster then
some extra space will exist within the cluster. This leftover space is known as
slack space: it may contain old data, or can be used intentionally by attackers
to hide information.
• “Bad” blocks/clusters/sectors—hard disks routinely end up with sectors that
cannot be read due to some physical defect. The sectors marked as bad will
be ignored by the operating system since no data could be read in those
defective portions. Attackers could intentionally mark sectors or clusters as
being bad in order to hide data within this portion of the disk.
CISSP Mentor Program Session #10
Domain #7: Security Operations
Digital Forensics
• Numerous tools that can be used to create the binary backup including free
tools such as dd and windd as well as commercial tools such as Ghost (when
run with specific nondefault switches enabled), AccessData's FTK, or
Guidance Software's EnCase.
• The general phases of the forensic process are:
• the identification of potential evidence;
• the acquisition of that evidence;
• analysis of the evidence;
• production of a report
• Hashing algorithms are used to verify the integrity of binary images
• When possible, the original media should not be used for analysis
CISSP Mentor Program Session #10
Domain #7: Security Operations
Live Forensics
• Forensics investigators have traditionally removed power from a
system, but the typical approach now is to gather volatile data.
Acquiring volatile data is called live forensics.
• The need for live forensics has grown tremendously due to non-
persistent tools that don’t write anything to disk
• One example from Metasploit…
CISSP Mentor Program Session #10
Domain #7: Security Operations
Live Forensics - Metasploit
• Popular free and open source exploitation framework
• Metasploit framework allows for the modularization of the underlying
components of an attack, which allows for exploit developers to focus
on their core competency without having to expend energy on
distribution or even developing a delivery, targeting, and payload
mechanism for their exploit
• Provides reusable components to limit extra work
• A payload is what Metasploit does after successfully exploiting a target
CISSP Mentor Program Session #10
Domain #7: Security Operations
Live Forensics – Metasploit & Meterpreter
• One of the most powerful Metasploit payloads
• Can allow password hashes of a compromised computer being dumped to an
attacker's machine
• The password hashes can then be fed into a password cracker
• Or the password hashes might be capable of being used directly in Metasploit's
PSExec exploit module, which is an implementation of functionality provided by
Sysinternal's (now owned by Microsoft) PSExec, but bolstered to support Pass the
Hash functionality.
Information on Microsoft's PSExec can be found at http://technet.microsoft.com/en-
us/sysinternals/bb897553.aspx. Further details on Pass the Hash techniques can be
found at http://oss.coresecurity.com/projects/pshtoolkit.htm
CISSP Mentor Program Session #10
Domain #7: Security Operations
Live Forensics – Metasploit & Meterpreter
• Dumping password hashes with Meterpreter.
• In addition to dumping password hashes, Meterpreter provides features such
as:
• command execution on the remote system
• uploading or downloading of files
• screen capture
• keystroke logging
• disabling the firewall
• disabling antivirus
• registry viewing and modification
• Meterpreter's capabilities are updated regularly
CISSP Mentor Program Session #10
Domain #7: Security Operations
Live Forensics – Metasploit & Meterpreter
• Dumping password hashes with Meterpreter.
CISSP Mentor Program Session #10
Domain #7: Security Operations
Live Forensics – Metasploit & Meterpreter
• Dumping the registry with Meterpreter.
• Meterpreter was designed with detection evasion in mind
• Meterpreter can provide almost all of the functionalities listed above
without creating a new file on the victim system
• Runs entirely within the context of the exploited victim process, and all
information is stored in physical memory rather than on the hard disk.
CISSP Mentor Program Session #10
Domain #7: Security Operations
Live Forensics – Metasploit & Meterpreter
• Dumping the registry with Meterpreter.
CISSP Mentor Program Session #10
Domain #7: Security Operations
Live Forensics – Metasploit & Meterpreter
• If the forensic investigator removed the power supply from the
compromised machine, destroying volatile memory: there would be
little to no information for the investigator to analyze
CISSP Mentor Program Session #10
Domain #7: Security Operations
Live Forensics – Metasploit & Meterpreter
• If the forensic investigator removed the power supply from the
compromised machine, destroying volatile memory: there would be
little to no information for the investigator to analyze
Questions?
We made it through Class #10!
Check it out…
We finished Domain 5: Identity and Access Management, went all the way
through it through Domain 6: Security Assessment and Testing, and started
Domain 7: Security Operations!
Homework for Thursday (6/2)
◦ Catch-up with reading; we’re going to finish Domain 7 on Thursday.
◦ Take a spin through the Access Control quiz.
Have a great mid-week!

More Related Content

What's hot

Slide Deck – Session 8 – FRSecure CISSP Mentor Program 2017
Slide Deck – Session 8 – FRSecure CISSP Mentor Program 2017Slide Deck – Session 8 – FRSecure CISSP Mentor Program 2017
Slide Deck – Session 8 – FRSecure CISSP Mentor Program 2017FRSecure
 
Slide Deck – Session 11 – FRSecure CISSP Mentor Program 2017
Slide Deck – Session 11 – FRSecure CISSP Mentor Program 2017Slide Deck – Session 11 – FRSecure CISSP Mentor Program 2017
Slide Deck – Session 11 – FRSecure CISSP Mentor Program 2017FRSecure
 
Cissp cbk final_exam-answers_v5.5
Cissp cbk final_exam-answers_v5.5Cissp cbk final_exam-answers_v5.5
Cissp cbk final_exam-answers_v5.5madunix
 
Slide Deck – Session 12 – FRSecure CISSP Mentor Program 2017
Slide Deck – Session 12 – FRSecure CISSP Mentor Program 2017Slide Deck – Session 12 – FRSecure CISSP Mentor Program 2017
Slide Deck – Session 12 – FRSecure CISSP Mentor Program 2017FRSecure
 
Slide Deck – Session 5 – FRSecure CISSP Mentor Program 2017
Slide Deck – Session 5 – FRSecure CISSP Mentor Program 2017Slide Deck – Session 5 – FRSecure CISSP Mentor Program 2017
Slide Deck – Session 5 – FRSecure CISSP Mentor Program 2017FRSecure
 
2018 FRecure CISSP Mentor Program- Session 4
2018 FRecure CISSP Mentor Program- Session 42018 FRecure CISSP Mentor Program- Session 4
2018 FRecure CISSP Mentor Program- Session 4FRSecure
 
2018 CISSP Mentor Program- Session 6
2018 CISSP Mentor Program- Session 62018 CISSP Mentor Program- Session 6
2018 CISSP Mentor Program- Session 6FRSecure
 
Slide Deck CISSP Class Session 5
Slide Deck CISSP Class Session 5Slide Deck CISSP Class Session 5
Slide Deck CISSP Class Session 5FRSecure
 
2019 FRSecure CISSP Mentor Program: Class Six
2019 FRSecure CISSP Mentor Program: Class Six2019 FRSecure CISSP Mentor Program: Class Six
2019 FRSecure CISSP Mentor Program: Class SixFRSecure
 
2018 FRSecure CISSP Mentor Program- Session 5
2018 FRSecure CISSP Mentor Program-  Session 52018 FRSecure CISSP Mentor Program-  Session 5
2018 FRSecure CISSP Mentor Program- Session 5FRSecure
 
2018 FRSecure CISSP Mentor Program Session 9
2018 FRSecure CISSP Mentor Program Session 92018 FRSecure CISSP Mentor Program Session 9
2018 FRSecure CISSP Mentor Program Session 9FRSecure
 
Slide Deck – Class Session 1 – FRSecure CISSP Mentor Program
Slide Deck – Class Session 1 – FRSecure CISSP Mentor ProgramSlide Deck – Class Session 1 – FRSecure CISSP Mentor Program
Slide Deck – Class Session 1 – FRSecure CISSP Mentor ProgramFRSecure
 
2018 FRSecure CISSP Mentor Program Session 11
2018 FRSecure CISSP Mentor Program Session 112018 FRSecure CISSP Mentor Program Session 11
2018 FRSecure CISSP Mentor Program Session 11FRSecure
 
2018 FRSecure CISSP Mentor Program Session 8
2018 FRSecure CISSP Mentor Program Session 82018 FRSecure CISSP Mentor Program Session 8
2018 FRSecure CISSP Mentor Program Session 8FRSecure
 
2019 FRSecure CISSP Mentor Program: Class Eight
2019  FRSecure CISSP Mentor Program: Class Eight2019  FRSecure CISSP Mentor Program: Class Eight
2019 FRSecure CISSP Mentor Program: Class EightFRSecure
 
2020 FRSecure CISSP Mentor Program - Class 8
2020 FRSecure CISSP Mentor Program - Class 82020 FRSecure CISSP Mentor Program - Class 8
2020 FRSecure CISSP Mentor Program - Class 8FRSecure
 
Purple Teaming - The Collaborative Future of Penetration Testing
Purple Teaming - The Collaborative Future of Penetration TestingPurple Teaming - The Collaborative Future of Penetration Testing
Purple Teaming - The Collaborative Future of Penetration TestingFRSecure
 
2019 FRSecure CISSP Mentor Program: Class Nine
2019 FRSecure CISSP Mentor Program: Class Nine2019 FRSecure CISSP Mentor Program: Class Nine
2019 FRSecure CISSP Mentor Program: Class NineFRSecure
 
Breaking and entering how and why dhs conducts penetration tests
Breaking and entering  how and why dhs conducts penetration testsBreaking and entering  how and why dhs conducts penetration tests
Breaking and entering how and why dhs conducts penetration testsPriyanka Aash
 
Advanced red teaming all your badges are belong to us
Advanced red teaming  all your badges are belong to usAdvanced red teaming  all your badges are belong to us
Advanced red teaming all your badges are belong to usPriyanka Aash
 

What's hot (20)

Slide Deck – Session 8 – FRSecure CISSP Mentor Program 2017
Slide Deck – Session 8 – FRSecure CISSP Mentor Program 2017Slide Deck – Session 8 – FRSecure CISSP Mentor Program 2017
Slide Deck – Session 8 – FRSecure CISSP Mentor Program 2017
 
Slide Deck – Session 11 – FRSecure CISSP Mentor Program 2017
Slide Deck – Session 11 – FRSecure CISSP Mentor Program 2017Slide Deck – Session 11 – FRSecure CISSP Mentor Program 2017
Slide Deck – Session 11 – FRSecure CISSP Mentor Program 2017
 
Cissp cbk final_exam-answers_v5.5
Cissp cbk final_exam-answers_v5.5Cissp cbk final_exam-answers_v5.5
Cissp cbk final_exam-answers_v5.5
 
Slide Deck – Session 12 – FRSecure CISSP Mentor Program 2017
Slide Deck – Session 12 – FRSecure CISSP Mentor Program 2017Slide Deck – Session 12 – FRSecure CISSP Mentor Program 2017
Slide Deck – Session 12 – FRSecure CISSP Mentor Program 2017
 
Slide Deck – Session 5 – FRSecure CISSP Mentor Program 2017
Slide Deck – Session 5 – FRSecure CISSP Mentor Program 2017Slide Deck – Session 5 – FRSecure CISSP Mentor Program 2017
Slide Deck – Session 5 – FRSecure CISSP Mentor Program 2017
 
2018 FRecure CISSP Mentor Program- Session 4
2018 FRecure CISSP Mentor Program- Session 42018 FRecure CISSP Mentor Program- Session 4
2018 FRecure CISSP Mentor Program- Session 4
 
2018 CISSP Mentor Program- Session 6
2018 CISSP Mentor Program- Session 62018 CISSP Mentor Program- Session 6
2018 CISSP Mentor Program- Session 6
 
Slide Deck CISSP Class Session 5
Slide Deck CISSP Class Session 5Slide Deck CISSP Class Session 5
Slide Deck CISSP Class Session 5
 
2019 FRSecure CISSP Mentor Program: Class Six
2019 FRSecure CISSP Mentor Program: Class Six2019 FRSecure CISSP Mentor Program: Class Six
2019 FRSecure CISSP Mentor Program: Class Six
 
2018 FRSecure CISSP Mentor Program- Session 5
2018 FRSecure CISSP Mentor Program-  Session 52018 FRSecure CISSP Mentor Program-  Session 5
2018 FRSecure CISSP Mentor Program- Session 5
 
2018 FRSecure CISSP Mentor Program Session 9
2018 FRSecure CISSP Mentor Program Session 92018 FRSecure CISSP Mentor Program Session 9
2018 FRSecure CISSP Mentor Program Session 9
 
Slide Deck – Class Session 1 – FRSecure CISSP Mentor Program
Slide Deck – Class Session 1 – FRSecure CISSP Mentor ProgramSlide Deck – Class Session 1 – FRSecure CISSP Mentor Program
Slide Deck – Class Session 1 – FRSecure CISSP Mentor Program
 
2018 FRSecure CISSP Mentor Program Session 11
2018 FRSecure CISSP Mentor Program Session 112018 FRSecure CISSP Mentor Program Session 11
2018 FRSecure CISSP Mentor Program Session 11
 
2018 FRSecure CISSP Mentor Program Session 8
2018 FRSecure CISSP Mentor Program Session 82018 FRSecure CISSP Mentor Program Session 8
2018 FRSecure CISSP Mentor Program Session 8
 
2019 FRSecure CISSP Mentor Program: Class Eight
2019  FRSecure CISSP Mentor Program: Class Eight2019  FRSecure CISSP Mentor Program: Class Eight
2019 FRSecure CISSP Mentor Program: Class Eight
 
2020 FRSecure CISSP Mentor Program - Class 8
2020 FRSecure CISSP Mentor Program - Class 82020 FRSecure CISSP Mentor Program - Class 8
2020 FRSecure CISSP Mentor Program - Class 8
 
Purple Teaming - The Collaborative Future of Penetration Testing
Purple Teaming - The Collaborative Future of Penetration TestingPurple Teaming - The Collaborative Future of Penetration Testing
Purple Teaming - The Collaborative Future of Penetration Testing
 
2019 FRSecure CISSP Mentor Program: Class Nine
2019 FRSecure CISSP Mentor Program: Class Nine2019 FRSecure CISSP Mentor Program: Class Nine
2019 FRSecure CISSP Mentor Program: Class Nine
 
Breaking and entering how and why dhs conducts penetration tests
Breaking and entering  how and why dhs conducts penetration testsBreaking and entering  how and why dhs conducts penetration tests
Breaking and entering how and why dhs conducts penetration tests
 
Advanced red teaming all your badges are belong to us
Advanced red teaming  all your badges are belong to usAdvanced red teaming  all your badges are belong to us
Advanced red teaming all your badges are belong to us
 

Viewers also liked

Slide Deck CISSP Class Session 4
Slide Deck CISSP Class Session 4Slide Deck CISSP Class Session 4
Slide Deck CISSP Class Session 4FRSecure
 
Slide Deck - CISSP Mentor Program Class Session 1
Slide Deck - CISSP Mentor Program Class Session 1Slide Deck - CISSP Mentor Program Class Session 1
Slide Deck - CISSP Mentor Program Class Session 1FRSecure
 
Slide Deck – Session 4 – FRSecure CISSP Mentor Program 2017
Slide Deck – Session 4 – FRSecure CISSP Mentor Program 2017Slide Deck – Session 4 – FRSecure CISSP Mentor Program 2017
Slide Deck – Session 4 – FRSecure CISSP Mentor Program 2017FRSecure
 
Slide Deck – Session 3 – FRSecure CISSP Mentor Program 2017
Slide Deck – Session 3 – FRSecure CISSP Mentor Program 2017Slide Deck – Session 3 – FRSecure CISSP Mentor Program 2017
Slide Deck – Session 3 – FRSecure CISSP Mentor Program 2017FRSecure
 
HHS Ransomware and Breach Guidance - Brad Nigh
HHS Ransomware and Breach Guidance - Brad NighHHS Ransomware and Breach Guidance - Brad Nigh
HHS Ransomware and Breach Guidance - Brad NighFRSecure
 
Slide Deck CISSP Class Session 3
Slide Deck CISSP Class Session 3Slide Deck CISSP Class Session 3
Slide Deck CISSP Class Session 3FRSecure
 
Slide Deck CISSP Class Session 2
Slide Deck CISSP Class Session 2Slide Deck CISSP Class Session 2
Slide Deck CISSP Class Session 2FRSecure
 
Slide Deck – Session 2 – FRSecure CISSP Mentor Program 2017
Slide Deck – Session 2 – FRSecure CISSP Mentor Program 2017Slide Deck – Session 2 – FRSecure CISSP Mentor Program 2017
Slide Deck – Session 2 – FRSecure CISSP Mentor Program 2017FRSecure
 

Viewers also liked (8)

Slide Deck CISSP Class Session 4
Slide Deck CISSP Class Session 4Slide Deck CISSP Class Session 4
Slide Deck CISSP Class Session 4
 
Slide Deck - CISSP Mentor Program Class Session 1
Slide Deck - CISSP Mentor Program Class Session 1Slide Deck - CISSP Mentor Program Class Session 1
Slide Deck - CISSP Mentor Program Class Session 1
 
Slide Deck – Session 4 – FRSecure CISSP Mentor Program 2017
Slide Deck – Session 4 – FRSecure CISSP Mentor Program 2017Slide Deck – Session 4 – FRSecure CISSP Mentor Program 2017
Slide Deck – Session 4 – FRSecure CISSP Mentor Program 2017
 
Slide Deck – Session 3 – FRSecure CISSP Mentor Program 2017
Slide Deck – Session 3 – FRSecure CISSP Mentor Program 2017Slide Deck – Session 3 – FRSecure CISSP Mentor Program 2017
Slide Deck – Session 3 – FRSecure CISSP Mentor Program 2017
 
HHS Ransomware and Breach Guidance - Brad Nigh
HHS Ransomware and Breach Guidance - Brad NighHHS Ransomware and Breach Guidance - Brad Nigh
HHS Ransomware and Breach Guidance - Brad Nigh
 
Slide Deck CISSP Class Session 3
Slide Deck CISSP Class Session 3Slide Deck CISSP Class Session 3
Slide Deck CISSP Class Session 3
 
Slide Deck CISSP Class Session 2
Slide Deck CISSP Class Session 2Slide Deck CISSP Class Session 2
Slide Deck CISSP Class Session 2
 
Slide Deck – Session 2 – FRSecure CISSP Mentor Program 2017
Slide Deck – Session 2 – FRSecure CISSP Mentor Program 2017Slide Deck – Session 2 – FRSecure CISSP Mentor Program 2017
Slide Deck – Session 2 – FRSecure CISSP Mentor Program 2017
 

Similar to FRSecure 2016 CISSP Mentor Program Session #10 Review

Hybrid - Seguridad en Contenedores v3.pptx
Hybrid - Seguridad en Contenedores v3.pptxHybrid - Seguridad en Contenedores v3.pptx
Hybrid - Seguridad en Contenedores v3.pptxHansFarroCastillo1
 
Pass4sure 640-864 Questions Answers
Pass4sure 640-864 Questions AnswersPass4sure 640-864 Questions Answers
Pass4sure 640-864 Questions AnswersRoxycodone Online
 
Latest Developments in Cloud Security Standards and Privacy
Latest Developments in Cloud Security Standards and PrivacyLatest Developments in Cloud Security Standards and Privacy
Latest Developments in Cloud Security Standards and PrivacyCloud Standards Customer Council
 
IEEE 1609.2 and Connected Vehicle Security: Standards Making in a Pocket Univ...
IEEE 1609.2 and Connected Vehicle Security: Standards Making in a Pocket Univ...IEEE 1609.2 and Connected Vehicle Security: Standards Making in a Pocket Univ...
IEEE 1609.2 and Connected Vehicle Security: Standards Making in a Pocket Univ...OnBoard Security, Inc. - a Qualcomm Company
 
Alfresco DevCon 2019: Encryption at-rest and in-transit
Alfresco DevCon 2019: Encryption at-rest and in-transitAlfresco DevCon 2019: Encryption at-rest and in-transit
Alfresco DevCon 2019: Encryption at-rest and in-transitToni de la Fuente
 
Managed Threat Detection and Response
Managed Threat Detection and ResponseManaged Threat Detection and Response
Managed Threat Detection and ResponseAlert Logic
 
Cloud Security Standards: What to Expect and What to Negotiate V2.0
Cloud Security Standards: What to Expect and What to Negotiate V2.0Cloud Security Standards: What to Expect and What to Negotiate V2.0
Cloud Security Standards: What to Expect and What to Negotiate V2.0Cloud Standards Customer Council
 
Single Sign-On & Strong Authentication
Single Sign-On & Strong AuthenticationSingle Sign-On & Strong Authentication
Single Sign-On & Strong AuthenticationArun S M
 
NUS-ISS Learning Day 2019-Software Platforms - Welcoming Unknown Enemies?
NUS-ISS Learning Day 2019-Software Platforms - Welcoming Unknown Enemies?NUS-ISS Learning Day 2019-Software Platforms - Welcoming Unknown Enemies?
NUS-ISS Learning Day 2019-Software Platforms - Welcoming Unknown Enemies?NUS-ISS
 
Managed Threat Detection & Response for AWS Applications
Managed Threat Detection & Response for AWS ApplicationsManaged Threat Detection & Response for AWS Applications
Managed Threat Detection & Response for AWS ApplicationsAlert Logic
 
Let's Get Start Your Preparation for CSA Certificate of Cloud Security Knowle...
Let's Get Start Your Preparation for CSA Certificate of Cloud Security Knowle...Let's Get Start Your Preparation for CSA Certificate of Cloud Security Knowle...
Let's Get Start Your Preparation for CSA Certificate of Cloud Security Knowle...Amaaira Johns
 
Nicolas destor pres_f5agility2018
Nicolas destor pres_f5agility2018Nicolas destor pres_f5agility2018
Nicolas destor pres_f5agility2018Nicolas Destor
 
APIsecure 2023 - Approaching Multicloud API Security USing Metacloud, David L...
APIsecure 2023 - Approaching Multicloud API Security USing Metacloud, David L...APIsecure 2023 - Approaching Multicloud API Security USing Metacloud, David L...
APIsecure 2023 - Approaching Multicloud API Security USing Metacloud, David L...apidays
 
Expand Your Control of Access to IBM i Systems and Data
Expand Your Control of Access to IBM i Systems and DataExpand Your Control of Access to IBM i Systems and Data
Expand Your Control of Access to IBM i Systems and DataPrecisely
 
Cyber security workshop talk.pptx
Cyber security workshop talk.pptxCyber security workshop talk.pptx
Cyber security workshop talk.pptxkamalakantas
 
OPC UA Connectivity with InduSoft and the OPC Foundation
OPC UA Connectivity with InduSoft and the OPC FoundationOPC UA Connectivity with InduSoft and the OPC Foundation
OPC UA Connectivity with InduSoft and the OPC FoundationAVEVA
 
Chapter 6 overview
Chapter 6 overviewChapter 6 overview
Chapter 6 overviewali raza
 

Similar to FRSecure 2016 CISSP Mentor Program Session #10 Review (20)

Hybrid - Seguridad en Contenedores v3.pptx
Hybrid - Seguridad en Contenedores v3.pptxHybrid - Seguridad en Contenedores v3.pptx
Hybrid - Seguridad en Contenedores v3.pptx
 
Pass4sure 640-864 Questions Answers
Pass4sure 640-864 Questions AnswersPass4sure 640-864 Questions Answers
Pass4sure 640-864 Questions Answers
 
Latest Developments in Cloud Security Standards and Privacy
Latest Developments in Cloud Security Standards and PrivacyLatest Developments in Cloud Security Standards and Privacy
Latest Developments in Cloud Security Standards and Privacy
 
CompTIA Cybersecurity Analyst Certification Tips and Tricks
CompTIA Cybersecurity Analyst Certification Tips and TricksCompTIA Cybersecurity Analyst Certification Tips and Tricks
CompTIA Cybersecurity Analyst Certification Tips and Tricks
 
IEEE 1609.2 and Connected Vehicle Security: Standards Making in a Pocket Univ...
IEEE 1609.2 and Connected Vehicle Security: Standards Making in a Pocket Univ...IEEE 1609.2 and Connected Vehicle Security: Standards Making in a Pocket Univ...
IEEE 1609.2 and Connected Vehicle Security: Standards Making in a Pocket Univ...
 
Cloud application security (CCSP Domain 4)
Cloud application security (CCSP Domain 4)Cloud application security (CCSP Domain 4)
Cloud application security (CCSP Domain 4)
 
Alfresco DevCon 2019: Encryption at-rest and in-transit
Alfresco DevCon 2019: Encryption at-rest and in-transitAlfresco DevCon 2019: Encryption at-rest and in-transit
Alfresco DevCon 2019: Encryption at-rest and in-transit
 
Managed Threat Detection and Response
Managed Threat Detection and ResponseManaged Threat Detection and Response
Managed Threat Detection and Response
 
Cloud Security Standards: What to Expect and What to Negotiate V2.0
Cloud Security Standards: What to Expect and What to Negotiate V2.0Cloud Security Standards: What to Expect and What to Negotiate V2.0
Cloud Security Standards: What to Expect and What to Negotiate V2.0
 
firewalls
firewallsfirewalls
firewalls
 
Single Sign-On & Strong Authentication
Single Sign-On & Strong AuthenticationSingle Sign-On & Strong Authentication
Single Sign-On & Strong Authentication
 
NUS-ISS Learning Day 2019-Software Platforms - Welcoming Unknown Enemies?
NUS-ISS Learning Day 2019-Software Platforms - Welcoming Unknown Enemies?NUS-ISS Learning Day 2019-Software Platforms - Welcoming Unknown Enemies?
NUS-ISS Learning Day 2019-Software Platforms - Welcoming Unknown Enemies?
 
Managed Threat Detection & Response for AWS Applications
Managed Threat Detection & Response for AWS ApplicationsManaged Threat Detection & Response for AWS Applications
Managed Threat Detection & Response for AWS Applications
 
Let's Get Start Your Preparation for CSA Certificate of Cloud Security Knowle...
Let's Get Start Your Preparation for CSA Certificate of Cloud Security Knowle...Let's Get Start Your Preparation for CSA Certificate of Cloud Security Knowle...
Let's Get Start Your Preparation for CSA Certificate of Cloud Security Knowle...
 
Nicolas destor pres_f5agility2018
Nicolas destor pres_f5agility2018Nicolas destor pres_f5agility2018
Nicolas destor pres_f5agility2018
 
APIsecure 2023 - Approaching Multicloud API Security USing Metacloud, David L...
APIsecure 2023 - Approaching Multicloud API Security USing Metacloud, David L...APIsecure 2023 - Approaching Multicloud API Security USing Metacloud, David L...
APIsecure 2023 - Approaching Multicloud API Security USing Metacloud, David L...
 
Expand Your Control of Access to IBM i Systems and Data
Expand Your Control of Access to IBM i Systems and DataExpand Your Control of Access to IBM i Systems and Data
Expand Your Control of Access to IBM i Systems and Data
 
Cyber security workshop talk.pptx
Cyber security workshop talk.pptxCyber security workshop talk.pptx
Cyber security workshop talk.pptx
 
OPC UA Connectivity with InduSoft and the OPC Foundation
OPC UA Connectivity with InduSoft and the OPC FoundationOPC UA Connectivity with InduSoft and the OPC Foundation
OPC UA Connectivity with InduSoft and the OPC Foundation
 
Chapter 6 overview
Chapter 6 overviewChapter 6 overview
Chapter 6 overview
 

More from FRSecure

2020 FRSecure CISSP Mentor Program - Class 11
2020 FRSecure CISSP Mentor Program - Class 112020 FRSecure CISSP Mentor Program - Class 11
2020 FRSecure CISSP Mentor Program - Class 11FRSecure
 
2020 FRSecure CISSP Mentor Program - Class 10
2020 FRSecure CISSP Mentor Program - Class 102020 FRSecure CISSP Mentor Program - Class 10
2020 FRSecure CISSP Mentor Program - Class 10FRSecure
 
2020 FRSecure CISSP Mentor Program - Class 9
2020 FRSecure CISSP Mentor Program - Class 92020 FRSecure CISSP Mentor Program - Class 9
2020 FRSecure CISSP Mentor Program - Class 9FRSecure
 
2020 FRSecure CISSP Mentor Program - Class 7
2020 FRSecure CISSP Mentor Program - Class 72020 FRSecure CISSP Mentor Program - Class 7
2020 FRSecure CISSP Mentor Program - Class 7FRSecure
 
2020 FRSecure CISSP Mentor Program - Class 6
2020 FRSecure CISSP Mentor Program - Class 62020 FRSecure CISSP Mentor Program - Class 6
2020 FRSecure CISSP Mentor Program - Class 6FRSecure
 
2020 FRSecure CISSP Mentor Program - Class 5
2020 FRSecure CISSP Mentor Program - Class 52020 FRSecure CISSP Mentor Program - Class 5
2020 FRSecure CISSP Mentor Program - Class 5FRSecure
 
2020 FRSecure CISSP Mentor Program - Class 4
2020 FRSecure CISSP Mentor Program - Class 42020 FRSecure CISSP Mentor Program - Class 4
2020 FRSecure CISSP Mentor Program - Class 4FRSecure
 
2020 FRSecure CISSP Mentor Program - Class 3
2020 FRSecure CISSP Mentor Program - Class 3 2020 FRSecure CISSP Mentor Program - Class 3
2020 FRSecure CISSP Mentor Program - Class 3 FRSecure
 
2020 FRSecure CISSP Mentor Program - Class 2
2020 FRSecure CISSP Mentor Program - Class 22020 FRSecure CISSP Mentor Program - Class 2
2020 FRSecure CISSP Mentor Program - Class 2FRSecure
 
2020 FRsecure CISSP Mentor Program - Class 1
2020 FRsecure CISSP Mentor Program - Class 12020 FRsecure CISSP Mentor Program - Class 1
2020 FRsecure CISSP Mentor Program - Class 1FRSecure
 
2019 FRSecure CISSP Mentor Program: Class Eleven
2019 FRSecure CISSP Mentor Program: Class Eleven2019 FRSecure CISSP Mentor Program: Class Eleven
2019 FRSecure CISSP Mentor Program: Class ElevenFRSecure
 
2019 FRSecure CISSP Mentor Program: Class Ten
2019 FRSecure CISSP Mentor Program: Class Ten2019 FRSecure CISSP Mentor Program: Class Ten
2019 FRSecure CISSP Mentor Program: Class TenFRSecure
 
2019 FRSecure CISSP Mentor Program: Class Seven
2019 FRSecure CISSP Mentor Program: Class Seven2019 FRSecure CISSP Mentor Program: Class Seven
2019 FRSecure CISSP Mentor Program: Class SevenFRSecure
 
2019 FRSecure CISSP Mentor Program: Class Four
2019 FRSecure CISSP Mentor Program: Class Four2019 FRSecure CISSP Mentor Program: Class Four
2019 FRSecure CISSP Mentor Program: Class FourFRSecure
 
2019 FRSecure CISSP Mentor Program: Class Three
2019 FRSecure CISSP Mentor Program: Class Three 2019 FRSecure CISSP Mentor Program: Class Three
2019 FRSecure CISSP Mentor Program: Class Three FRSecure
 
2019 FRecure CISSP Mentor Program: Session Two
2019 FRecure CISSP Mentor Program: Session Two2019 FRecure CISSP Mentor Program: Session Two
2019 FRecure CISSP Mentor Program: Session TwoFRSecure
 
2019 FRSecure CISSP Mentor Program: Class One
2019 FRSecure CISSP Mentor Program: Class One2019 FRSecure CISSP Mentor Program: Class One
2019 FRSecure CISSP Mentor Program: Class OneFRSecure
 
FRSecure 2018 CISSP Mentor Program Session 10
FRSecure 2018 CISSP Mentor Program Session 10FRSecure 2018 CISSP Mentor Program Session 10
FRSecure 2018 CISSP Mentor Program Session 10FRSecure
 
2018 FRSecure CISSP Mentor Program- Session 7
2018 FRSecure CISSP Mentor Program- Session 72018 FRSecure CISSP Mentor Program- Session 7
2018 FRSecure CISSP Mentor Program- Session 7FRSecure
 
2018 CISSP Mentor Program Session 3
2018 CISSP Mentor Program Session 32018 CISSP Mentor Program Session 3
2018 CISSP Mentor Program Session 3FRSecure
 

More from FRSecure (20)

2020 FRSecure CISSP Mentor Program - Class 11
2020 FRSecure CISSP Mentor Program - Class 112020 FRSecure CISSP Mentor Program - Class 11
2020 FRSecure CISSP Mentor Program - Class 11
 
2020 FRSecure CISSP Mentor Program - Class 10
2020 FRSecure CISSP Mentor Program - Class 102020 FRSecure CISSP Mentor Program - Class 10
2020 FRSecure CISSP Mentor Program - Class 10
 
2020 FRSecure CISSP Mentor Program - Class 9
2020 FRSecure CISSP Mentor Program - Class 92020 FRSecure CISSP Mentor Program - Class 9
2020 FRSecure CISSP Mentor Program - Class 9
 
2020 FRSecure CISSP Mentor Program - Class 7
2020 FRSecure CISSP Mentor Program - Class 72020 FRSecure CISSP Mentor Program - Class 7
2020 FRSecure CISSP Mentor Program - Class 7
 
2020 FRSecure CISSP Mentor Program - Class 6
2020 FRSecure CISSP Mentor Program - Class 62020 FRSecure CISSP Mentor Program - Class 6
2020 FRSecure CISSP Mentor Program - Class 6
 
2020 FRSecure CISSP Mentor Program - Class 5
2020 FRSecure CISSP Mentor Program - Class 52020 FRSecure CISSP Mentor Program - Class 5
2020 FRSecure CISSP Mentor Program - Class 5
 
2020 FRSecure CISSP Mentor Program - Class 4
2020 FRSecure CISSP Mentor Program - Class 42020 FRSecure CISSP Mentor Program - Class 4
2020 FRSecure CISSP Mentor Program - Class 4
 
2020 FRSecure CISSP Mentor Program - Class 3
2020 FRSecure CISSP Mentor Program - Class 3 2020 FRSecure CISSP Mentor Program - Class 3
2020 FRSecure CISSP Mentor Program - Class 3
 
2020 FRSecure CISSP Mentor Program - Class 2
2020 FRSecure CISSP Mentor Program - Class 22020 FRSecure CISSP Mentor Program - Class 2
2020 FRSecure CISSP Mentor Program - Class 2
 
2020 FRsecure CISSP Mentor Program - Class 1
2020 FRsecure CISSP Mentor Program - Class 12020 FRsecure CISSP Mentor Program - Class 1
2020 FRsecure CISSP Mentor Program - Class 1
 
2019 FRSecure CISSP Mentor Program: Class Eleven
2019 FRSecure CISSP Mentor Program: Class Eleven2019 FRSecure CISSP Mentor Program: Class Eleven
2019 FRSecure CISSP Mentor Program: Class Eleven
 
2019 FRSecure CISSP Mentor Program: Class Ten
2019 FRSecure CISSP Mentor Program: Class Ten2019 FRSecure CISSP Mentor Program: Class Ten
2019 FRSecure CISSP Mentor Program: Class Ten
 
2019 FRSecure CISSP Mentor Program: Class Seven
2019 FRSecure CISSP Mentor Program: Class Seven2019 FRSecure CISSP Mentor Program: Class Seven
2019 FRSecure CISSP Mentor Program: Class Seven
 
2019 FRSecure CISSP Mentor Program: Class Four
2019 FRSecure CISSP Mentor Program: Class Four2019 FRSecure CISSP Mentor Program: Class Four
2019 FRSecure CISSP Mentor Program: Class Four
 
2019 FRSecure CISSP Mentor Program: Class Three
2019 FRSecure CISSP Mentor Program: Class Three 2019 FRSecure CISSP Mentor Program: Class Three
2019 FRSecure CISSP Mentor Program: Class Three
 
2019 FRecure CISSP Mentor Program: Session Two
2019 FRecure CISSP Mentor Program: Session Two2019 FRecure CISSP Mentor Program: Session Two
2019 FRecure CISSP Mentor Program: Session Two
 
2019 FRSecure CISSP Mentor Program: Class One
2019 FRSecure CISSP Mentor Program: Class One2019 FRSecure CISSP Mentor Program: Class One
2019 FRSecure CISSP Mentor Program: Class One
 
FRSecure 2018 CISSP Mentor Program Session 10
FRSecure 2018 CISSP Mentor Program Session 10FRSecure 2018 CISSP Mentor Program Session 10
FRSecure 2018 CISSP Mentor Program Session 10
 
2018 FRSecure CISSP Mentor Program- Session 7
2018 FRSecure CISSP Mentor Program- Session 72018 FRSecure CISSP Mentor Program- Session 7
2018 FRSecure CISSP Mentor Program- Session 7
 
2018 CISSP Mentor Program Session 3
2018 CISSP Mentor Program Session 32018 CISSP Mentor Program Session 3
2018 CISSP Mentor Program Session 3
 

Recently uploaded

Dust Of Snow By Robert Frost Class-X English CBSE
Dust Of Snow By Robert Frost Class-X English CBSEDust Of Snow By Robert Frost Class-X English CBSE
Dust Of Snow By Robert Frost Class-X English CBSEaurabinda banchhor
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptxmary850239
 
TEACHER REFLECTION FORM (NEW SET........).docx
TEACHER REFLECTION FORM (NEW SET........).docxTEACHER REFLECTION FORM (NEW SET........).docx
TEACHER REFLECTION FORM (NEW SET........).docxruthvilladarez
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfVanessa Camilleri
 
Millenials and Fillennials (Ethical Challenge and Responses).pptx
Millenials and Fillennials (Ethical Challenge and Responses).pptxMillenials and Fillennials (Ethical Challenge and Responses).pptx
Millenials and Fillennials (Ethical Challenge and Responses).pptxJanEmmanBrigoli
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptxiammrhaywood
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management SystemChristalin Nelson
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
EMBODO Lesson Plan Grade 9 Law of Sines.docx
EMBODO Lesson Plan Grade 9 Law of Sines.docxEMBODO Lesson Plan Grade 9 Law of Sines.docx
EMBODO Lesson Plan Grade 9 Law of Sines.docxElton John Embodo
 

Recently uploaded (20)

Dust Of Snow By Robert Frost Class-X English CBSE
Dust Of Snow By Robert Frost Class-X English CBSEDust Of Snow By Robert Frost Class-X English CBSE
Dust Of Snow By Robert Frost Class-X English CBSE
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx
 
TEACHER REFLECTION FORM (NEW SET........).docx
TEACHER REFLECTION FORM (NEW SET........).docxTEACHER REFLECTION FORM (NEW SET........).docx
TEACHER REFLECTION FORM (NEW SET........).docx
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdf
 
Millenials and Fillennials (Ethical Challenge and Responses).pptx
Millenials and Fillennials (Ethical Challenge and Responses).pptxMillenials and Fillennials (Ethical Challenge and Responses).pptx
Millenials and Fillennials (Ethical Challenge and Responses).pptx
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
Paradigm shift in nursing research by RS MEHTA
Paradigm shift in nursing research by RS MEHTAParadigm shift in nursing research by RS MEHTA
Paradigm shift in nursing research by RS MEHTA
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management System
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
EMBODO Lesson Plan Grade 9 Law of Sines.docx
EMBODO Lesson Plan Grade 9 Law of Sines.docxEMBODO Lesson Plan Grade 9 Law of Sines.docx
EMBODO Lesson Plan Grade 9 Law of Sines.docx
 

FRSecure 2016 CISSP Mentor Program Session #10 Review

  • 1. FRSecure 2016 CISSP Mentor Program EVAN FRANCEN, PRESIDENT & CO-FOUNDER - FRSECURE CLASS SESSION #10
  • 2. CISSP Mentor Program Session #10 Domain 4: Communication and Network Security - Review • Network Scanning Tools • Secure Communications • Wireless Local Area Networks • Remote Access We finished Domain 4!
  • 3. CISSP Mentor Program Session #10 Domain 5: Identity and Access Management - Review • Cornerstone access control concepts • Access control models • Authentication Methods • Type 1 • Type 2 • Type 3 • Single Sign-On (SSO) Now for the Domain 4 Quiz…
  • 4. CISSP Mentor Program Session #10 Domain 4: Communication and Network Security Quiz Review
  • 5. CISSP Mentor Program Session #10 Domain 4: Communication and Network Security Quiz Review 1. Which protocol should be used for an audio streaming server, where some loss is acceptable? a. IP b. ICMP c. TCP d. UDP D
  • 6. CISSP Mentor Program Session #10 Domain 4: Communication and Network Security Quiz Review 2. What network topology uses fixed-length cells to carry data? a. ARCNET b. ATM c. Ethernet d. FDDI B
  • 7. CISSP Mentor Program Session #10 Domain 4: Communication and Network Security Quiz Review 3. Secure Shell (SSH) servers listen on what port and protocol? a. TCP port 20 b. TCP port 21 c. TCP port 22 d. TCP port 23 C
  • 8. CISSP Mentor Program Session #10 Domain 4: Communication and Network Security Quiz Review 4. What network cable type can transmit the most data at the longest distance? a. Coaxial b. Fiber optic c. Shielded Twisted Pair (STP) d. Unshielded Twisted Pair (UTP) B
  • 9. CISSP Mentor Program Session #10 Domain 4: Communication and Network Security Quiz Review 5. Which device operates at Layer 2 of the OSI model? a. Hub b. Firewall c. Switch d. Router C
  • 10. CISSP Mentor Program Session #10 Domain 4: Communication and Network Security Quiz Review 6. What are the names of the OSI model layers, in order from bottom to top? a. Physical, Data Link, Transport, Network, Session, Presentation, Application b. Physical, Network, Data Link, Transport, Session, Presentation, Application c. Physical, Data Link, Network, Transport, Session, Presentation, Application d. Physical, Data Link, Network, Transport, Presentation, Session, Application C
  • 11. CISSP Mentor Program Session #10 Domain 4: Communication and Network Security Quiz Review 7. Which of the following authentication protocols uses a three-way authentication handshake? a. CHAP b. EAP c. Kerberos d. PAP A
  • 12. CISSP Mentor Program Session #10 Domain 4: Communication and Network Security Quiz Review 8. Restricting Bluetooth device discovery relies on the secrecy of what? a. MAC address b. Symmetric key c. Private key d. Public key B
  • 13. CISSP Mentor Program Session #10 Domain 4: Communication and Network Security Quiz Review 9. Which wireless security protocol is also known as the RSN (Robust Security Network), and implements the full 802.11i standard? a. AES b. WEP c. WPA d. WPA2 D
  • 14. CISSP Mentor Program Session #10 Domain 4: Communication and Network Security Quiz Review 10. What is the difference between a stateful firewall and a proxy firewall? a. Stateful firewalls have state, proxy firewalls do not b. Proxy firewalls have state, stateful firewalls do not c. Stateful firewalls terminate connections, proxy firewalls do not d. Proxy firewalls terminate connections, stateful firewalls do not D
  • 15. CISSP Mentor Program Session #10 Domain 4: Communication and Network Security Quiz Review 11. Which transmission mode is supported by both HDLC and SDLC? a. Asynchronous Balanced Mode (ABM) b. Asynchronous Response Mode (ARM) c. Normal Balanced Mode (NBM) d. Normal Response Mode (NRM) D
  • 16. CISSP Mentor Program Session #10 Domain 4: Communication and Network Security Quiz Review 12. What is the most secure type of EAP? a. EAP-TLS b. EAL-TLLS c. LEAP d. PEAP A
  • 17. CISSP Mentor Program Session #10 Domain 4: Communication and Network Security Quiz Review 13. What WAN protocol has no error recovery, relying on higher level protocols to provide reliability? a. ATM b. Frame Relay c. SMDS d. X.25 B
  • 18. CISSP Mentor Program Session #10 Domain 4: Communication and Network Security Quiz Review 14. What is the most secure type of firewall? a. Packet filter b. Stateful firewall c. Circuit-level proxy firewall d. Application-layer proxy firewall D
  • 19. CISSP Mentor Program Session #10 Domain 4: Communication and Network Security Quiz Review 15. Accessing an IPv6 network via an IPv4 network is called what? a. CIDR b. NAT c. Translation d. Tunneling D
  • 20. CISSP Mentor Program Session #10 Domain 5: Identity and Access Management Single Sign-On (SSO) As outlined in the IBM article, “Build and Implement a Single Sign-On Solution” by Chris Dunne, September 30, 2003, SSO is an important access control and can offer the following benefits: • “Improved user productivity. Users are no longer bogged down by multiple logins and they are not required to remember multiple IDs and passwords. Also, support personnel answer fewer requests to reset forgotten passwords.” • “Improved developer productivity. SSO provides developers with a common authentication framework. In fact, if the SSO mechanism is independent, then developers do not have to worry about authentication at all. They can assume that once a request for an application is accompanied by a username, then authentication has already taken place.” • “Simplified administration. When applications participate in a single sign-on protocol, the administration burden of managing user accounts is simplified. The degree of simplification depends on the applications since SSO only deals with authentication. So, applications may still require user- specific attributes (such as access privileges) to be set up.”
  • 21. CISSP Mentor Program Session #9 Domain 5: Identity and Access Management Single Sign-On (SSO) The disadvantages of SSO are listed below and must be considered before implementing SSO on a system: • “Difficult to retrofit. An SSO solution can be difficult, time consuming, and expensive to retrofit to existing applications.” • “Unattended desktop. Implementing SSO reduces some security risks, but increases others. For example, a malicious user could gain access to a user’s resources if the user walks away from his machine and leaves it logged in. Although this is a problem with security in general, it is worse with SSO because all authorized resources are compromised. At least with multiple logons, the user may only be logged into one system at the time and so only one resource is compromised.” • “Single point of attack. With single sign-on, a single, central authentication service is used by all applications. This is an attractive target for hackers who may decide to carry out a denial of service attack.”
  • 22. CISSP Mentor Program Session #10 Domain 5: Identity and Access Management Access Provisioning Lifecycle • After an access control model has been chosen. • Identity Lifecycle – provisioning, maintenance (passwords/rights/privileges), changes, re-provisioning, reconciliation/audit
  • 23. CISSP Mentor Program Session #10 Domain 5: Identity and Access Management Access Provisioning Lifecycle IBM describes the following identity lifecycle rules: • “Password policy compliance checking • Notifying users to change their passwords before they expire • Identifying life cycle changes such as accounts that are inactive for more than 30 consecutive days • Identifying new accounts that have not been used for more than 10 days following their creation • Identifying accounts that are candidates for deletion because they have been suspended for more than 30 days • When a contract expires, identifying all accounts belonging to a business partner or contractor’s employees and revoking their access rights”
  • 24. CISSP Mentor Program Session #10 Domain 5: Identity and Access Management User Entitlement, Access Review and Audit • Authorization creep • occurs when subjects not only maintain old access rights but gain new ones as they move from one role to another within an organization • User rights (or entitlements) must be routinely reviewed
  • 25. CISSP Mentor Program Session #10 Domain 5: Identity and Access Management Single Sign-On (SSO) • Identity as a service (IDaaS) - Gartner Inc., divides IDaaS services into two categories: • Web access software for cloud-based applications such as software as a service (SaaS) • Web-architected applications; and cloud-delivered legacy identity management services. • LDAP – Lightweight Directory Access Protocol – common, open protocol for interfacing and querying directory service information over a network. TCP/UDP port 389. LDAPS (LDAP over TLS); TCP 636 & 3269
  • 26. CISSP Mentor Program Session #10 Domain 5: Identity and Access Management Single Sign-On (SSO) - Kerberos • A third-party authentication service that may be used to support Single Sign-On • Kerberos (http://www.kerberos.org/) was the name of the three- headed dog that guarded the entrance to Hades (also called Cerberus) in Greek mythology • The three heads of the mythical Kerberos were meant to signify the three “A”s of AAA systems: authentication, authorization, and accountability • The original Kerberos mainly provided authentication
  • 27. CISSP Mentor Program Session #10 Domain 5: Identity and Access Management Single Sign-On (SSO) - Kerberos • Kerberos FAQ (see http://www.faqs.org/faqs/kerberos-faq/user/) states: • Kerberos is a network authentication system for use on physically insecure networks • Based on the key distribution model presented by Needham and Schroeder • Allows entities communicating over networks to prove their identity to each other while preventing eavesdropping or replay attacks • Provides for data stream integrity (detection of modification) and secrecy (preventing unauthorized reading) using cryptography systems such as DES (Data Encryption Standard)
  • 28. CISSP Mentor Program Session #10 Domain 5: Identity and Access Management Single Sign-On (SSO) - Kerberos • Uses secret key encryption • Provides mutual authentication of both clients and servers • Protects against network sniffing and replay attacks • Current version of Kerberos is version 5, described by RFC 4120 (http://www.ietf.org/rfc/rfc4120.txt) • Kerberos has the following components: • Principal: Client (user) or service • Realm: A logical Kerberos network • Ticket: Data that authenticates a principal’s identity • Credentials: a ticket and a service key • KDC: Key Distribution Center, which authenticates principals • TGS: Ticket Granting Service • TGT: Ticket Granting Ticket • C/S: Client Server, regarding communications between the two
  • 29. CISSP Mentor Program Session #10 Domain 5: Identity and Access Management Single Sign-On (SSO) - Kerberos
  • 30. CISSP Mentor Program Session #10 Domain 5: Identity and Access Management Single Sign-On (SSO) - Kerberos • Strengths: • Provides mutual authentication of client and server • If a rogue KDC pretended to be a real KDC, it would not have access to keys • mitigates replay attacks (where attackers sniff Kerberos credentials and replay them on the network) via the use of timestamps
  • 31. CISSP Mentor Program Session #10 Domain 5: Identity and Access Management Single Sign-On (SSO) - Kerberos • Weaknesses: • KDC stores the plaintext keys of all principals (clients and servers) • A compromise of the KDC (physical or electronic) can lead to the compromise of every key in the Kerberos realm • KDC and TGS are single points of failure: if they go down, no new credentials can be issued • Replay attacks are still possible for the lifetime of the authenticator (An attacker could sniff an authenticator, launch a denial-of-service attack against the client, and then assume or spoof the client’s IP address) • Any user may request a session key for another user • Kerberos does not mitigate a malicious local host: plaintext keys may exist in memory or cache
  • 32. CISSP Mentor Program Session #10 Domain 5: Identity and Access Management Single Sign-On (SSO) - SESAME • Secure European System for Applications in a Multi-vendor Environment • A single sign-on system that supports heterogeneous environments • Can be thought of as a sequel of sorts to Kerberos • It addresses one of the biggest weaknesses in Kerberos: the plaintext storage of symmetric keys • Uses Privilege Attribute Certificates (PACs) in place of Kerberos’ tickets • More information on SESAME is available at: https://www.cosic.esat.kuleuven.be/sesame/
  • 33. CISSP Mentor Program Session #10 Domain 5: Identity and Access Management Access Control Protocols And Frameworks - RADIUS • Remote Authentication Dial In User Service (RADIUS) protocol • A third-party authentication system • Described in RFCs 2865 and 2866 • Uses the User Datagram Protocol (UDP) ports 1812 (authentication) and 1813 (accounting) • Formerly used the (unofficially assigned) ports of 1645 and 1646 for the same respective purposes; some continue to use those ports • Considered an “AAA” system • Authenticates a subject’s credentials against an authentication database • Authorizes users by allowing specific users’ access to specific data objects • Accounts for each data session by creating a log entry for each connection made
  • 34. CISSP Mentor Program Session #10 Domain 5: Identity and Access Management Access Control Protocols And Frameworks - RADIUS • Request and response data is carried in Attribute Value Pairs (AVPs) • According to RFC 2865 (http://tools.ietf.org/html/rfc2865), RADIUS supports the following codes: • Access-Request • Access-Accept • Access-Reject • Accounting-Request • Accounting-Response • Access-Challenge • Status-Server (experimental) • Status-Client (experimental)
  • 35. CISSP Mentor Program Session #10 Domain 5: Identity and Access Management Access Control Protocols And Frameworks - RADIUS
  • 36. CISSP Mentor Program Session #10 Domain 5: Identity and Access Management Access Control Protocols And Frameworks - Diameter • RADIUS’ successor • Designed to provide an improved Authentication, Authorization, and Accounting (AAA) framework • Also uses Attribute Value Pairs, but supports many more: • RADIUS uses 8 bits for the AVP field (allowing 256 total possible AVPs) • Diameter uses 32 bits for the AVP field (allowing billions of potential AVPs) • Uses a single server to manage policies for many services, as opposed to RADIUS which requires many servers to handle all of the secure connection protocols • Provides AAA functionality • More reliable by using the Transmission Control Protocol (TCP) • Currently a draft standard, first described by RFC 3588 (http://tools.ietf.org/html/rfc3588)
  • 37. CISSP Mentor Program Session #10 Domain 5: Identity and Access Management Access Control Protocols And Frameworks - TACACS and TACACS+ • Terminal Access Controller Access Control System (TACACS) • Centralized access control system that requires users to send an ID and static (reusable) password for authentication • TACACS uses UDP port 49 (and may also use TCP) • Reusable passwords have security vulnerability: the improved TACACS+ provides better password protection by allowing two-factor strong authentication • TACACS+ is not backwards compatible with TACACS • TACACS+ uses TCP port 49 for authentication with the TACACS+ server • The actual function of authentication is similar to RADIUS • RADIUS only encrypts the password (leaving other data, such as username, unencrypted); TACACS+ encrypts all data below the TACACS+ header
  • 38. CISSP Mentor Program Session #10 Domain 5: Identity and Access Management Access Control Protocols And Frameworks - TACACS and TACACS+ • Terminal Access Controller Access Control System (TACACS) • Centralized access control system that requires users to send an ID and static (reusable) password for authentication • TACACS uses UDP port 49 (and may also use TCP) • Reusable passwords have security vulnerability: the improved TACACS+ provides better password protection by allowing two-factor strong authentication • TACACS+ is not backwards compatible with TACACS • TACACS+ uses TCP port 49 for authentication with the TACACS+ server • The actual function of authentication is similar to RADIUS • RADIUS only encrypts the password (leaving other data, such as username, unencrypted); TACACS+ encrypts all data below the TACACS+ header
  • 39. CISSP Mentor Program Session #10 Domain 5: Identity and Access Management PAP and CHAP • Password Authentication Protocol (PAP) • Defined by RFC 1334 (http://tools.ietf.org/html/rfc1334#section-2) • Not a strong authentication method • User password and it is sent across the network in clear text • When received by the PAP server, it is authenticated and validated • Challenge Handshake Authentication Protocol (CHAP) • Defined by RFC 1994 (http://www.faqs.org/rfcs/rfc1994.html) • Provides protection against playback attacks • Uses a central location that challenges remote users • “CHAP depends upon a ‘secret’ known only to the authenticator and the peer. The secret is not sent over the link. Although the authentication is only one-way, by negotiating CHAP in both directions the same secret set may easily be used for mutual authentication.” • A sniffer that views the entire challenge/response process will not be able to determine the shared secret
  • 40. CISSP Mentor Program Session #10 Domain 5: Identity and Access Management Access Control Protocols And Frameworks - Microsoft Active Directory Domains • Microsoft Windows Active Directory uses the concept of domains as the primary means to control access • For authentication purposes, Microsoft bases their authentication of trust relationships on RFC 1510, the Kerberos Authentication Protocol, and it is fully integrated into Microsoft Windows operating systems since Windows 2000. • Each domain has a separate authentication process and space • Each domain may contain different users and different network assets and data objects • If a two-way trust between domains is created, then the users and data objects from each domain can be accessed by groups belonging to either domain.
  • 41. CISSP Mentor Program Session #10 Domain 5: Identity and Access Management Access Control Protocols And Frameworks - Microsoft Active Directory Domains As stated by Microsoft, • “How a specific trust passes authentication requests depends on how it is configured; trust relationships can be one-way, providing access from the trusted domain to resources in the trusting domain, or two way, providing access from each domain to resources in the other domain. Trusts are also either nontransitive, in which case trust exists only between the two trust partner domains, or transitive, in which case trust automatically extends to any other domains that either of the partners trusts.” • Microsoft trust relationships fall into two categories; nontransitive and transitive. Nontransitive trusts only exist between two trust partners. Transitive trusts exist between two partners and all of their partner domains. For example, if A trusts B, in a transitive trust, A will trust B and all of B’s trust partners.
  • 42. CISSP Mentor Program Session #10 Domain 5: Identity and Access Management DONE! On to Domain #6: Security Assessment and Testing A new domain…
  • 43. CISSP Mentor Program Session #10 Domain 6: Security Assessment and Testing • Assessing Access Control • Software Testing Methods Unique Terms & Definitions: • Dynamic Testing – Tests code while executing it • Fuzzing – A type of black box testing that submits random, malformed data as inputs into software programs to determine if they will crash • Penetration Testing – Authorized attempt to break into an organization’s physical or electronic perimeter (and sometimes both) • Static Testing – Tests code passively: the code is not running. • Synthetic Transactions – Also called synthetic monitoring: involves building scripts or tools that simulate activities normally performed in an application
  • 44. CISSP Mentor Program Session #10 Domain 6: Security Assessment and Testing Penetration Testing - Black Hats and White Hats • Black hat attackers are malicious hackers, sometimes called crackers. • “Black” derives from villains in fiction: Darth Vader wore all black • Lack ethics, sometimes violate laws, and break into computer systems with malicious intent, and may violate the confidentiality, integrity, or availability of organization’s systems and data • White hat hackers are the “good guys” • Professional penetration testers who break into systems with permission • Malware researches who research malicious code to provide better understanding and ethically disclose vulnerabilities to vendors, etc. • Also known as ethical hackers; they follow a code of ethics and obey laws • Gray hat hackers fall somewhere between black and white hats • Exploits a security weakness in a computer system or product in order to bring the weakness to the attention of the owners • Unlike a black hat, a gray hat acts without malicious intent • The goal of a gray hat is to improve system and network security
  • 45. CISSP Mentor Program Session #10 Domain 6: Security Assessment and Testing Penetration Testing • A penetration tester is a white hat hacker who receives authorization to attempt to break into an organization’s physical or electronic perimeter (and sometimes both) • Penetration tests (called “pen tests” for short) are designed to determine whether black hat hackers could do the same • A narrow test • Penetration tests may include the following tests: • Network (Internet) • Network (internal or DMZ) • Wardialing • Wireless • Physical (attempt to gain entrance into a facility or room) • Wireless • Network attacks may leverage client-side attacks, server-side attacks, or Web application attacks
  • 46. CISSP Mentor Program Session #10 Domain 6: Security Assessment and Testing Penetration Testing • War dialing uses modem to dial a series of phone numbers, looking for an answering modem carrier tone (the penetration tester then attempts to access the answering system); the name derives from the 1983 movie WarGames • Social engineering uses the human mind to bypass security controls • May be used in combination with many types of attacks, especially client-side attacks or physical tests • An example of a social engineering attack combined with a client-side attack is emailing malware with a Subject line of “Category 5 Hurricane is about to hit Florida!” • A physical social engineering attack (used to tailgate an authorized user into a building)
  • 47. CISSP Mentor Program Session #10 Domain 6: Security Assessment and Testing Penetration Testing • A zero-knowledge (also called black box) test is “blind”; the penetration tester begins with no external or trusted information, and begins the attack with public information only • A full-knowledge test (also called crystal-box) provides internal information to the penetration tester, including network diagrams, policies and procedures, and sometimes reports from previous penetration testers • Partial-knowledge tests are in between zero and full knowledge: the penetration tester receives some limited trusted information • Most penetration tests have a scope that includes a limitation on the time spent conducting the test
  • 48. CISSP Mentor Program Session #10 Domain 6: Security Assessment and Testing Penetration Testing Tools and Methodology • Penetration testing tools: • Open source Metasploit (http://www.metasploit.org) • Closed source Core Impact (http://www.coresecurity.com) and Immunity Canvas (http://www.immunitysec.com) • Top 125 Network Security Tools (http://sectools.org/) • Custom tools
  • 49. CISSP Mentor Program Session #10 Domain 6: Security Assessment and Testing Penetration Testing Tools and Methodology • Penetration testers use the following methodology: • Planning • Reconnaissance • Scanning (also called enumeration) • Vulnerability assessment • Exploitation • Reporting • Black hat hackers typically follow a similar methodology • Black hats will also cover their tracks (erase logs and other signs of intrusion), and frequently violate system integrity by installing back doors (in order to maintain access)
  • 50. CISSP Mentor Program Session #10 Domain 6: Security Assessment and Testing Assuring Confidentiality, Data Integrity, and System Integrity • Penetration testers must ensure the confidentiality of any sensitive data that is accessed during the test • Testers will often request that a dummy file containing no regulated or sensitive data (sometimes called a flag) be placed in the same area of the system as the credit card data, and protected with the same permissions • If the tester can read and/or write to that file, then they prove they could have done the same to the credit card data • Penetration testers must be sure to ensure the system integrity and data integrity of their client’s systems • The risk of encountering signs of a previous or current successful malicious attack (discuss this before starting a test)
  • 51. CISSP Mentor Program Session #10 Domain 6: Security Assessment and Testing Vulnerability Testing • Vulnerability scanning (also called vulnerability testing) scans a network or system for a list of predefined vulnerabilities such as system misconfiguration, outdated software, or a lack of patching • Nessus (http://www.nessus.org), OpenVAS (http://www.openvas.org), Qualys, and Rapid 7/Nexpose • Missing patches and configuration errors • Common Vulnerability Scoring System (CVSS) - https://nvd.nist.gov/cvss.cfm
  • 52. CISSP Mentor Program Session #10 Domain 6: Security Assessment and Testing Security Audits • Testing against a published standard • PCI-DSS compliance • SOC 2, Type 1 and SOC 2, Type 2 • Purpose is to validate/verify that an organization meets the requirements as stated in the published standard
  • 53. CISSP Mentor Program Session #10 Domain 6: Security Assessment and Testing Security Assessments • A holistic approach to assessing the effectiveness of access control • Broad scope • Security assessments view many controls across multiple domains, and may include the following: • Policies, procedures, and other administrative controls • Assessing the real world-effectiveness of administrative controls • Change management • Architectural review • Penetration tests • Vulnerability assessments • Security audits
  • 54. CISSP Mentor Program Session #10 Domain 6: Security Assessment and Testing Security Assessments • Key words… “assessing the effectiveness” • Where there are gaps in control (weakness/vulnerability), what are the applicable threats? • Vulnerabilities + Threats = Likelihoods & Impacts = RISK • FRSecure specializes in assessments – FISA™
  • 55. CISSP Mentor Program Session #10 Domain 6: Security Assessment and Testing Security Assessments • FRSecure specializes in assessments – FISA™ is at our core.
  • 56. CISSP Mentor Program Session #10 Domain 6: Security Assessment and Testing Internal and 3rd-Party Audits • Internal audit • Structured audits – external audience, validate compliance, etc. • Unstructured audits – internal audience, improve security, etc. • 3rd-Party audits • Experts (hopefully) • Adds credibility • Teach
  • 57. CISSP Mentor Program Session #10 Domain 6: Security Assessment and Testing Security Audit Logs • According to “Five mistakes of Log Analysis” by Anton Chuvakin (see http://www.computerworld.com/s/article/96587/Five_mistakes_of_lo g_analysis), audit record management typically faces five distinct problems: • Log are not reviewed on a regular and timely basis. • Audit logs and audit trails are not stored for a long enough time period. • Logs are not standardized or viewable by correlation toolsets—they are only viewable from the system being audited. • Log entries and alerts are not prioritized. • Audit records are only reviewed for the “bad stuff.”
  • 58. CISSP Mentor Program Session #10 Domain 6: Security Assessment and Testing Security Audit Logs • Reviewing security audit logs within an IT system is one of the easiest ways to verify that access control mechanisms are performing adequately • Reviewing audit logs is primarily a detective control • According to NIST Special Publication 800-92 (http://csrc.nist.gov/publications/nistpubs/800- 92/SP800-92.pdf), the following log types should be collected: • Network Security Software/Hardware: • Antivirus logs • IDS/IPS logs • Remote Access Software (such as VPN logs) • Web proxy • Vulnerability management • Authentication servers • Routers and firewalls
  • 59. CISSP Mentor Program Session #10 Domain 6: Security Assessment and Testing Security Audit Logs • According to NIST Special Publication 800-92 (http://csrc.nist.gov/publications/nistpubs/800-92/SP800-92.pdf), the following log types should be collected: • Operating System: • System events • Audit records • Applications • Client requests and server responses • Usage information • Significant operational actions
  • 60. CISSP Mentor Program Session #10 Domain 6: Security Assessment and Testing Security Audit Logs – Centralized Logging • Assists in log retention (sufficient for legal/regulatory compliance and investigation) • Assists in log protection (integrity & availability) • SIEM • Log protection • Log aggregation • Log correlation • Dashboard reporting
  • 61. CISSP Mentor Program Session #10 Domain 6: Security Assessment and Testing Software Testing Methods • Static testing tests the code passively: the code is not running. This includes walkthroughs, syntax checking, and code reviews. • Dynamic testing tests the code while executing it. • White box software testing gives the tester access to program source code, data structures, variables, etc. • Black box testing gives the tester no internal details: the software is treated as a black box that receives inputs. • Traceability Matrix (sometimes called a Requirements Traceability Matrix, or RTM) can be used to map customer’s requirements to the software testing plan: it “traces” the “requirements,” and ensures that they are being met. • Fuzzing (also called fuzz testing) is a type of black box testing that enters random, malformed data as inputs into software programs to determine if they will crash. • Combinatorial software testing is a black-box testing method that seeks to identify and test all unique combinations of software inputs.
  • 62. CISSP Mentor Program Session #10 Domain 6: Security Assessment and Testing Software Testing Methods • Static testing tests the code passively: the code is not running. This includes walkthroughs, syntax checking, and code reviews. • analysis of computer software that is performed without actually executing programs • In most cases the analysis is performed on some version of the source code, and in the other cases, some form of the object code • List of tools for static code analysis (https://en.wikipedia.org/wiki/List_of_tools_for_static_code_analysis)
  • 63. CISSP Mentor Program Session #10 Domain 6: Security Assessment and Testing Software Testing Methods • Traceability Matrix (or Requirements Traceability Matrix or RTM)
  • 64. CISSP Mentor Program Session #10 Domain 6: Security Assessment and Testing Software Testing Levels • Unit Testing: Low-level tests of software components, such as functions, procedures or objects • Installation Testing: Testing software as it is installed and first operated • Integration Testing: Testing multiple software components as they are combined into a working system. Subsets may be tested, or Big Bang integration testing tests all integrated software components • Regression Testing: Testing software after updates, modifications, or patches • Acceptance Testing: testing to ensure the software meets the customer’s operational requirements. When this testing is done directly by the customer, it is called User Acceptance Testing.
  • 65. CISSP Mentor Program Session #10 Domain 6: Security Assessment and Testing Fuzzing • Black box testing that enters random, malformed data as inputs into software programs to determine if they will crash. • Typical causes are boundary checking issues, leading to possible buffer overflows • Typically automated, repeatedly presenting random input strings as command line switches, environment variables, and program inputs attack • List of good fuzzers; http://sectools.org/tag/fuzzers/. • Burp Suite https://portswigger.net/burp/
  • 66. CISSP Mentor Program Session #10 Domain 6: Security Assessment and Testing Other Software Testing Terms • Misuse Case Testing - derived from and is the inverse of use case testing; describes the process of executing a malicious act against a system, while use case can be used to describe any action taken by the system • Test Coverage Analysis • Interface Testing – testing of all interfaces exposed by the application. • Combinatorial software testing - a black-box testing method that seeks to identify and test all unique combinations of software inputs.
  • 67. CISSP Mentor Program Session #10 Domain 6: Security Assessment and Testing DONE! On to Domain #7: Security Operations Adomain…
  • 68. CISSP Mentor Program Session #10 Domain #7: Security Operations • Administrative Security • Forensics • Incident Response Management • Operational Preventive and Detective Controls • Asset Management • Continuity of Operations • BCP and DRP Overview and Process • Developing a BCP/DRP • Backups and Availability • DRP Testing, Training and Awareness • Continued BCP/DRP Maintenance • Specific BCP/DRP Frameworks
  • 69. CISSP Mentor Program Session #10 Domain #7: Security Operations Unique Terms and Definitions • Business Continuity Plan (BCP)—a long-term plan to ensure the continuity of business operations • Collusion—An agreement between two or more individuals to subvert the security of a system • Continuity of Operations Plan (COOP)—a plan to maintain operations during a disaster. • Disaster—any disruptive event that interrupts normal system operations • Disaster Recovery Plan (DRP)—a short-term plan to recover from a disruptive event
  • 70. CISSP Mentor Program Session #10 Domain #7: Security Operations Unique Terms and Definitions • Mean Time Between Failures (MTBF)—quantifies how long a new or repaired system will run on average before failing • Mean Time to Repair (MTTR)—describes how long it will take to recover a failed system • Mirroring—Complete duplication of data to another disk, used by some levels of RAID. • Redundant Array of Inexpensive Disks (RAID)—A method of using multiple disk drives to achieve greater data reliability, greater speed, or both • Striping—Spreading data writes across multiple disks to achieve performance gains, used by some levels of RAID
  • 71. CISSP Mentor Program Session #10 Domain #7: Security Operations Administrative security • Administrative Security provides the means to control people's operational access to data Least Privilege or Minimum Necessary Access • Dictates that persons have no more than the access that is strictly required for the performance of their duties • May also be referred to as the principle of minimum necessary access • Discretionary Access Control (DAC) – most often applicable
  • 72. CISSP Mentor Program Session #10 Domain #7: Security Operations Need to know • Mandatory Access Control (MAC) • Access determination is based upon clearance levels of subjects and classification levels of objects • An extension to the principle of least privilege in MAC environments is the concept of compartmentalization: • A method for enforcing need to know goes beyond the reliance upon clearance level and necessitates simply that someone requires access to information.
  • 73. CISSP Mentor Program Session #10 Domain #7: Security Operations Separation of Duties • Prescribes that multiple people are required to complete critical or sensitive transactions • Goal of separation of duties is to ensure that in order for someone to be able to abuse their access to sensitive data or transactions; they must convince another party to act in concert • Collusion is the term used for the two parties conspiring to undermine the security of the transaction
  • 74. CISSP Mentor Program Session #10 Domain #7: Security Operations Rotation of Duties/Job Rotation • Also known as job rotation or rotation of responsibilities • Provides a means to help mitigate the risk associated with any one individual having too many privileges • Requires that critical functions or responsibilities are not continuously performed by the same single person without interruption • “hit by a bus” or “win the lottery” scenario Exam Warning: Though job or responsibility rotation is an important control, this, like many other controls, is often compared against the cost of implementing the control. Many organizations will opt for not implementing rotation of duties because of the cost associated with implementation. For the exam, be certain to appreciate that cost is always a consideration, and can trump the implementation of some controls.
  • 75. CISSP Mentor Program Session #10 Domain #7: Security Operations Mandatory Leave/Forced Vacation • Also known as forced vacation • Can identify areas where depth of coverage is lacking • Can also help discover fraudulent or suspicious behavior • Knowledge that mandatory leave is a possibility might deter some individuals from engaging in the fraudulent behavior in the first place
  • 76. CISSP Mentor Program Session #10 Domain #7: Security Operations Non-Disclosure Agreement • A work-related contractual agreement that ensures that, prior to being given access to sensitive information or data, an individual or organization appreciates their legal responsibility to maintain the confidentiality of sensitive information. • Often signed by job candidates before they are hired, as well as consultants or contractors • Largely a directive control
  • 77. CISSP Mentor Program Session #10 Domain #7: Security Operations Background Checks • Also known as background investigations or preemployment screening • Majority of background investigations are performed as part of a preemployment screening process • The sensitivity of the position being filled or data to which the individual will have access strongly determines the degree to which this information is scrutinized and the depth to which the investigation will report • Ongoing, or postemployment, investigations seek to determine whether the individual continues to be worthy of the trust required of their position • Background checks performed in advance of employment serve as a preventive control while ongoing repeat background checks constitute a detective control and possibly a deterrent.
  • 78. CISSP Mentor Program Session #10 Domain #7: Security Operations Privilege Monitoring • Heightened privileges require both greater scrutiny and more thoughtful controls • Some of the job functions that warrant greater scrutiny include: account creation/modification/deletion, system reboots, data backup, data restoration, source code access, audit log access, security configuration capabilities, etc.
  • 79. CISSP Mentor Program Session #10 Domain #7: Security Operations Digital Forensics • Provides a formal approach to dealing with investigations and evidence with special consideration of the legal aspects of the process • Forensics is closely related to incident response • Main distinction between forensics and incident response is that forensics is evidence-centric and typically more closely associated with crimes, while incident response is more dedicated to identifying, containing, and recovering from security incidents • The forensic process must preserve the “crime scene” and the evidence in order to prevent unintentionally violating the integrity of either the data or the data's environment
  • 80. CISSP Mentor Program Session #10 Domain #7: Security Operations Digital Forensics • Prevent unintentional modification of the system • Antiforensics makes forensic investigation difficult or impossible • One method is malware that is entirely memory-resident, and not installed on the disk drive. If an investigator removes power from a system with entirely memory-resident malware, all volatile memory including RAM is lost, and evidence is destroyed. • Valuable data is gathered during the live forensic capture • The main source of forensic data typically comes from binary images of secondary storage and portable storage devices such as hard disk drives, USB flash drives, CDs, DVDs, and possibly associated cellular phones and mp3 players • A binary or bit stream image is used because an exact replica of the original data is needed • Normal backup software will only capture the active partitions of a disk, and only that data which is marked as allocated
  • 81. CISSP Mentor Program Session #10 Domain #7: Security Operations Digital Forensics The four types of data that exist: • Allocated space—portions of a disk partition which are marked as actively containing data. • Unallocated space—portions of a disk partition that do not contain active data. This includes memory that has never been allocated, and previously allocated memory that has been marked unallocated. If a file is deleted, the portions of the disk that held the deleted file are marked as unallocated and available for use.
  • 82. CISSP Mentor Program Session #10 Domain #7: Security Operations Digital Forensics The four types of data that exist: • Slack space—data is stored in specific size chunks known as clusters. A cluster is the minimum size that can be allocated by a file system. If a particular file, or final portion of a file, does not require the use of the entire cluster then some extra space will exist within the cluster. This leftover space is known as slack space: it may contain old data, or can be used intentionally by attackers to hide information. • “Bad” blocks/clusters/sectors—hard disks routinely end up with sectors that cannot be read due to some physical defect. The sectors marked as bad will be ignored by the operating system since no data could be read in those defective portions. Attackers could intentionally mark sectors or clusters as being bad in order to hide data within this portion of the disk.
  • 83. CISSP Mentor Program Session #10 Domain #7: Security Operations Digital Forensics • Numerous tools that can be used to create the binary backup including free tools such as dd and windd as well as commercial tools such as Ghost (when run with specific nondefault switches enabled), AccessData's FTK, or Guidance Software's EnCase. • The general phases of the forensic process are: • the identification of potential evidence; • the acquisition of that evidence; • analysis of the evidence; • production of a report • Hashing algorithms are used to verify the integrity of binary images • When possible, the original media should not be used for analysis
  • 84. CISSP Mentor Program Session #10 Domain #7: Security Operations Live Forensics • Forensics investigators have traditionally removed power from a system, but the typical approach now is to gather volatile data. Acquiring volatile data is called live forensics. • The need for live forensics has grown tremendously due to non- persistent tools that don’t write anything to disk • One example from Metasploit…
  • 85. CISSP Mentor Program Session #10 Domain #7: Security Operations Live Forensics - Metasploit • Popular free and open source exploitation framework • Metasploit framework allows for the modularization of the underlying components of an attack, which allows for exploit developers to focus on their core competency without having to expend energy on distribution or even developing a delivery, targeting, and payload mechanism for their exploit • Provides reusable components to limit extra work • A payload is what Metasploit does after successfully exploiting a target
  • 86. CISSP Mentor Program Session #10 Domain #7: Security Operations Live Forensics – Metasploit & Meterpreter • One of the most powerful Metasploit payloads • Can allow password hashes of a compromised computer being dumped to an attacker's machine • The password hashes can then be fed into a password cracker • Or the password hashes might be capable of being used directly in Metasploit's PSExec exploit module, which is an implementation of functionality provided by Sysinternal's (now owned by Microsoft) PSExec, but bolstered to support Pass the Hash functionality. Information on Microsoft's PSExec can be found at http://technet.microsoft.com/en- us/sysinternals/bb897553.aspx. Further details on Pass the Hash techniques can be found at http://oss.coresecurity.com/projects/pshtoolkit.htm
  • 87. CISSP Mentor Program Session #10 Domain #7: Security Operations Live Forensics – Metasploit & Meterpreter • Dumping password hashes with Meterpreter. • In addition to dumping password hashes, Meterpreter provides features such as: • command execution on the remote system • uploading or downloading of files • screen capture • keystroke logging • disabling the firewall • disabling antivirus • registry viewing and modification • Meterpreter's capabilities are updated regularly
  • 88. CISSP Mentor Program Session #10 Domain #7: Security Operations Live Forensics – Metasploit & Meterpreter • Dumping password hashes with Meterpreter.
  • 89. CISSP Mentor Program Session #10 Domain #7: Security Operations Live Forensics – Metasploit & Meterpreter • Dumping the registry with Meterpreter. • Meterpreter was designed with detection evasion in mind • Meterpreter can provide almost all of the functionalities listed above without creating a new file on the victim system • Runs entirely within the context of the exploited victim process, and all information is stored in physical memory rather than on the hard disk.
  • 90. CISSP Mentor Program Session #10 Domain #7: Security Operations Live Forensics – Metasploit & Meterpreter • Dumping the registry with Meterpreter.
  • 91. CISSP Mentor Program Session #10 Domain #7: Security Operations Live Forensics – Metasploit & Meterpreter • If the forensic investigator removed the power supply from the compromised machine, destroying volatile memory: there would be little to no information for the investigator to analyze
  • 92. CISSP Mentor Program Session #10 Domain #7: Security Operations Live Forensics – Metasploit & Meterpreter • If the forensic investigator removed the power supply from the compromised machine, destroying volatile memory: there would be little to no information for the investigator to analyze
  • 93. Questions? We made it through Class #10! Check it out… We finished Domain 5: Identity and Access Management, went all the way through it through Domain 6: Security Assessment and Testing, and started Domain 7: Security Operations! Homework for Thursday (6/2) ◦ Catch-up with reading; we’re going to finish Domain 7 on Thursday. ◦ Take a spin through the Access Control quiz. Have a great mid-week!