SlideShare a Scribd company logo
1 of 24
Copyright (c) 2019 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org
Troubleshooting Security Issues
1
• Troubleshoot Identity and Access Issues
• Troubleshoot Attacks
• Troubleshoot Other Security Issues
Copyright (c) 2019 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org
Authentication Issues
2
• First determine if the problem is truly authentication and not some other problem
with the cloud network, the device, or the application.
• See if someone else can authenticate.
• If no one can authenticate by using one method, then see if users can authenticate
by using some other method.
• Also try, if available, a different authentication protocol, such as Kerberos, NTLM,
smart card/token, MS-CHAP v2 (for remote access), and more.
• Check the Event Viewer logs or error messages to see if there is any indication of the
problem.
Copyright (c) 2019 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org
Authorization Issues
3
Copyright (c) 2019 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org
Federation and SSO Issues
4
There are some potential issues with SSO and federation that you need to consider
before implementing these systems.
• How the system will provision and de-provision user accounts.
• How a user is allowed to reset their passwords.
Copyright (c) 2019 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org
Certificate Issues
5
Issue Description
Unencrypted credentials Credentials are sent over the network unencrypted, or they are
stored in cleartext form.
Certificate issues Digital certificates are invalid, insecure, or non-functional.
Key management issues Encryption keys are inaccessible to authorized personnel or
accessible to unauthorized personnel.
Copyright (c) 2019 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org
Incorrect Identity and Access Hardening Settings
6
• Personnel: The most common use for IAM is to define identities for organizational
employees. Likewise, personnel identities are among the most popular attack
vectors.
• Endpoints: The devices that people use to gain legitimate access to your network are
varied and often difficult to account for in an IAM system. This is especially true of
mobile devices like smartphones, tablets, and laptops.
• Software: Like servers, applications and services can be uniquely identified in the
organization through digital certificates. One unique issue with applications is how to
determine which other entities are allowed to run certain apps.
• Roles: Roles support the identities of various assets by defining the resources an
asset has permission to access based on the function that asset fulfills. Role-based
identity can have poorly defined roles that can lead to privilege creep.
Copyright (c) 2019 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org
Guidelines for Troubleshooting Identity and Access Issues
7
• When users experience authentication issues, first try to determine if the issue is
related to something else instead.
• When an issue occurs, determine if it affects other users or just one.
• Consider how the system will provision and de-provision user accounts when using
SSO and federation before implementing these systems.
• Consider how users will reset their passwords when using SSO before implementing
these systems.
• Consider how non-user assets in your organization fit into your IAM scheme.
Copyright (c) 2019 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org
Activity: Troubleshooting Identity and Access Issues
8
• Your manager at Rudison Technologies poses different scenarios to you and asks
what troubleshooting steps you would take to troubleshoot identity and access
issues.
Copyright (c) 2019 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org
External Attacks
9
1. Attacker executes
automated signup script on
cloud provider
4. Distributed cloud resources
overload target server
2. Virtual resources provisioned to
individual accounts
3. Attacker consolidates
control over virtual
environments
Copyright (c) 2019 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org
Internal Attacks
10
Issue Description
Policy violation Personnel violate your organization's policy and engage in
unacceptable use of systems, data, and the network.
Social media and personal messaging
use
Personnel use social media and personal messaging accounts in
ways that bring risk to the organization.
Social engineering Personnel fall victim to social engineering attacks and divulge
sensitive information or give access to unauthorized users.
Insider threat Disgruntled or otherwise malicious personnel use their unique
knowledge of the organization to exploit it for personal gain.
Copyright (c) 2019 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org
Privilege Escalation
11
• Vertical
• User can perform functions not normally assigned to their role or explicitly permitted.
• Example: Normal user gains access to admin rights.
• Horizontal
• User can access or modify specific resources they are not entitled to.
• Example: Normal user gains access to other users’ private data.
User A User B
Admin
Horizontal
Copyright (c) 2019 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org
Attack Vectors Related to Configuration
12
Although the paths that attackers take are diverse, there are three general elements that
can contribute to an attack vector:
• Vulnerabilities: Attackers will almost always search for holes within your systems and
networks.
• Exploits: These almost always depend on vulnerabilities to be effective. When the
gap in security is identified, the attacker can launch a tool or utility to take advantage
of that gap.
• Techniques: An attack's technique provides more detail about the path it takes, as
well as how it operates. It can also help categorize the effects of an exploit payload.
Copyright (c) 2019 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org
Guidelines for Troubleshooting Attacks
13
• Consider familiarizing yourself with different types of attacks on clouds so that you
will be better prepared to recognize and troubleshoot them.
• Remember that attacks don't come from outside your organization only; they can
come from inside your organization as well.
• User accounts can be a source of multiple attacks, so ensure you have good user
management in place to mitigate this.
• Understand the vectors that attackers take as this is a crucial step in security because
it helps the practitioner identify the how of an attack.
Copyright (c) 2019 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org
Activity: Troubleshooting Attacks
14
• Your manager at Rudison Technologies poses different scenarios to you and asks
what troubleshooting steps you would take to troubleshoot attack issues.
Copyright (c) 2019 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org
Unencrypted Communication
15
Some steps to help encrypt communications are:
• Ensure that you are using secure remote protocols like SSH.
• Ensure that you are using SSL/TLS to secure web-based communications.
• Ensure that users know not to store passwords in unencrypted text, spreadsheet, or
database files.
• Ensure that any custom apps you develop employ encryption for data at rest, in
transit, and in use.
Copyright (c) 2019 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org
Unauthorized Physical Access
16
Physical Resource Vulnerabilities
Building and grounds • Location
• Physical access control
Devices • Servers
• Laptops and tablets
• Mobile phones
• Other wireless devices
Communications • Telecommunications
• Service providers
• Wireless cells
Copyright (c) 2019 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org
Unencrypted Data
17
Unencrypted data is vulnerable
regardless of where it is located.
Copyright (c) 2019 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org
Weak or Obsolete Security Technologies
18
• Securing your environment is a good accomplishment but only if it is done well and
maintained.
• When implementing security, ensure that you are following best practices and using
settings that provide adequate security.
• Even when you implement good security, you may still not maintain the level of
protection you want.
• You need to periodically review your security settings and also review new
vulnerabilities so that you can then implement changes to keep your environment
safe.
Copyright (c) 2019 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org
Insufficient Security Controls and Processes
19
• Having insufficient security controls can leave your environment open to attacks.
• These can range from physical controls such as locks, to technical controls such as
anti-malware or firewalls.
• Having insufficient security processes can leave your environment open to attacks
even if you have good security controls in place.
• Security processes include items such as security governance, policy management,
awareness and education, identity and access management, vulnerability
management, and incident response.
Copyright (c) 2019 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org
Tunneling or Encryption Issues
20
• Tunneling with a protocol such as SSH, or using a VPN, can provide access to your
cloud from another network.
• While these provide a useful service they can also create potential issues.
• Tunneling can be used to "sneak through" a firewall by wrapping a protocol that the
firewall would normally block inside a protocol that the firewall does not block.
Copyright (c) 2019 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org
Security Device Failure
21
Network Device Issues
Access point Access points are incorrectly authenticating users or are non-functional.
Firewall Firewalls fail to prevent unwanted traffic from entering or leaving the
network, or block legitimate traffic from entering or leaving the network.
Content filter The content filter blocks legitimate content, or fails to block undesirable
content.
Intrusion detection system (IDS) The IDS frequently encounters false positives and false negatives.
Copyright (c) 2019 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org
Guidelines for Troubleshooting Other Security Issues
22
• Always encrypt your communications to prevent attackers from gaining important
information like account passwords.
• Remember that your physical security is as important as your virtual security as it will
keep intruders from gaining access to your organization and your staff.
• Remember that unencrypted data is vulnerable regardless of where it is located.
• Ensure you are implementing adequate security settings when you secure your
environment so that you have the level of security you require.
• Review your security settings and new vulnerabilities on a periodic basis to discover
new attack vectors that you can then implement security for.
• Ensure that your security controls are adequate for your environment to avoid
additional security issues.
• Ensure that you implement adequate security controls to further protect your
organization and avoid security or potential legal issues.
Copyright (c) 2019 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org
Activity: Troubleshooting Other Security Issues
23
• Your manager at Rudison Technologies poses different scenarios to you and asks
what troubleshooting steps you would take to troubleshoot other security issues.
Reflective Questions
Copyright (c) 2019 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org
Reflective Questions
1. What types of attacks have you had to deal with in your environment? How
did you detect them and stop them?
2. What other security issues have you identified in your environment?
24

More Related Content

Similar to 093049ov16.pptx

Smart Identity for the Hybrid Multicloud World
Smart Identity for the Hybrid Multicloud WorldSmart Identity for the Hybrid Multicloud World
Smart Identity for the Hybrid Multicloud WorldKatherine Cola
 
Information Technology Security Is Vital For The Success...
Information Technology Security Is Vital For The Success...Information Technology Security Is Vital For The Success...
Information Technology Security Is Vital For The Success...Brianna Johnson
 
Securing Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP LeaksSecuring Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP LeaksHokme
 
IRJET- Minimize Phishing Attacks: Securing Spear Attacks
IRJET- Minimize Phishing Attacks: Securing Spear AttacksIRJET- Minimize Phishing Attacks: Securing Spear Attacks
IRJET- Minimize Phishing Attacks: Securing Spear AttacksIRJET Journal
 
Securing your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEsSecuring your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEsSonny Hashmi
 
Securing your digital world cybersecurity for sb es
Securing your digital world   cybersecurity for sb esSecuring your digital world   cybersecurity for sb es
Securing your digital world cybersecurity for sb esSonny Hashmi
 
IBM X-Force Threat Intelligence: Why Insider Threats Challenge Critical Busin...
IBM X-Force Threat Intelligence: Why Insider Threats Challenge Critical Busin...IBM X-Force Threat Intelligence: Why Insider Threats Challenge Critical Busin...
IBM X-Force Threat Intelligence: Why Insider Threats Challenge Critical Busin...IBM Security
 
Beating Sophisticated Attackers at Their Game Using AWS
Beating Sophisticated Attackers at Their Game Using AWSBeating Sophisticated Attackers at Their Game Using AWS
Beating Sophisticated Attackers at Their Game Using AWSAmazon Web Services
 
Breaking down the cyber security framework closing critical it security gaps
Breaking down the cyber security framework closing critical it security gapsBreaking down the cyber security framework closing critical it security gaps
Breaking down the cyber security framework closing critical it security gapsIBM Security
 
X-Force Threat Intelligence: Fight Insider Threats & Protect Your Sensitive Data
X-Force Threat Intelligence: Fight Insider Threats & Protect Your Sensitive DataX-Force Threat Intelligence: Fight Insider Threats & Protect Your Sensitive Data
X-Force Threat Intelligence: Fight Insider Threats & Protect Your Sensitive DataIBM Security
 
3433 IBM messaging security why securing your environment is important-feb2...
3433   IBM messaging security why securing your environment is important-feb2...3433   IBM messaging security why securing your environment is important-feb2...
3433 IBM messaging security why securing your environment is important-feb2...Robert Parker
 
IBM Messaging Security - Why securing your environment is important : IBM Int...
IBM Messaging Security - Why securing your environment is important : IBM Int...IBM Messaging Security - Why securing your environment is important : IBM Int...
IBM Messaging Security - Why securing your environment is important : IBM Int...Leif Davidsen
 
MIST Effective Masquerade Attack Detection in the Cloud
MIST Effective Masquerade Attack Detection in the CloudMIST Effective Masquerade Attack Detection in the Cloud
MIST Effective Masquerade Attack Detection in the CloudKumar Goud
 
David valovcin big data - big risk
David valovcin big data - big riskDavid valovcin big data - big risk
David valovcin big data - big riskIBM Sverige
 
Cybertopic_2security
Cybertopic_2securityCybertopic_2security
Cybertopic_2securityAnne Starr
 
Certes webinar securing the frictionless enterprise
Certes webinar   securing the frictionless enterpriseCertes webinar   securing the frictionless enterprise
Certes webinar securing the frictionless enterpriseJason Bloomberg
 

Similar to 093049ov16.pptx (20)

Internet Security Agent
Internet Security AgentInternet Security Agent
Internet Security Agent
 
H04025057
H04025057H04025057
H04025057
 
Smart Identity for the Hybrid Multicloud World
Smart Identity for the Hybrid Multicloud WorldSmart Identity for the Hybrid Multicloud World
Smart Identity for the Hybrid Multicloud World
 
Cybersecurity update 12
Cybersecurity update 12Cybersecurity update 12
Cybersecurity update 12
 
Information Technology Security Is Vital For The Success...
Information Technology Security Is Vital For The Success...Information Technology Security Is Vital For The Success...
Information Technology Security Is Vital For The Success...
 
Securing Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP LeaksSecuring Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP Leaks
 
IRJET- Minimize Phishing Attacks: Securing Spear Attacks
IRJET- Minimize Phishing Attacks: Securing Spear AttacksIRJET- Minimize Phishing Attacks: Securing Spear Attacks
IRJET- Minimize Phishing Attacks: Securing Spear Attacks
 
Securing your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEsSecuring your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEs
 
Securing your digital world cybersecurity for sb es
Securing your digital world   cybersecurity for sb esSecuring your digital world   cybersecurity for sb es
Securing your digital world cybersecurity for sb es
 
IBM X-Force Threat Intelligence: Why Insider Threats Challenge Critical Busin...
IBM X-Force Threat Intelligence: Why Insider Threats Challenge Critical Busin...IBM X-Force Threat Intelligence: Why Insider Threats Challenge Critical Busin...
IBM X-Force Threat Intelligence: Why Insider Threats Challenge Critical Busin...
 
User_Access_IIA-LA_3-9-2016
User_Access_IIA-LA_3-9-2016User_Access_IIA-LA_3-9-2016
User_Access_IIA-LA_3-9-2016
 
Beating Sophisticated Attackers at Their Game Using AWS
Beating Sophisticated Attackers at Their Game Using AWSBeating Sophisticated Attackers at Their Game Using AWS
Beating Sophisticated Attackers at Their Game Using AWS
 
Breaking down the cyber security framework closing critical it security gaps
Breaking down the cyber security framework closing critical it security gapsBreaking down the cyber security framework closing critical it security gaps
Breaking down the cyber security framework closing critical it security gaps
 
X-Force Threat Intelligence: Fight Insider Threats & Protect Your Sensitive Data
X-Force Threat Intelligence: Fight Insider Threats & Protect Your Sensitive DataX-Force Threat Intelligence: Fight Insider Threats & Protect Your Sensitive Data
X-Force Threat Intelligence: Fight Insider Threats & Protect Your Sensitive Data
 
3433 IBM messaging security why securing your environment is important-feb2...
3433   IBM messaging security why securing your environment is important-feb2...3433   IBM messaging security why securing your environment is important-feb2...
3433 IBM messaging security why securing your environment is important-feb2...
 
IBM Messaging Security - Why securing your environment is important : IBM Int...
IBM Messaging Security - Why securing your environment is important : IBM Int...IBM Messaging Security - Why securing your environment is important : IBM Int...
IBM Messaging Security - Why securing your environment is important : IBM Int...
 
MIST Effective Masquerade Attack Detection in the Cloud
MIST Effective Masquerade Attack Detection in the CloudMIST Effective Masquerade Attack Detection in the Cloud
MIST Effective Masquerade Attack Detection in the Cloud
 
David valovcin big data - big risk
David valovcin big data - big riskDavid valovcin big data - big risk
David valovcin big data - big risk
 
Cybertopic_2security
Cybertopic_2securityCybertopic_2security
Cybertopic_2security
 
Certes webinar securing the frictionless enterprise
Certes webinar   securing the frictionless enterpriseCertes webinar   securing the frictionless enterprise
Certes webinar securing the frictionless enterprise
 

More from NguyenNM

SRWE_Module_12.pptx
SRWE_Module_12.pptxSRWE_Module_12.pptx
SRWE_Module_12.pptxNguyenNM
 
SRWE_Module_14.pptx
SRWE_Module_14.pptxSRWE_Module_14.pptx
SRWE_Module_14.pptxNguyenNM
 
readme_vap902.pdf
readme_vap902.pdfreadme_vap902.pdf
readme_vap902.pdfNguyenNM
 
chuong 1 tts.ppt
chuong 1 tts.pptchuong 1 tts.ppt
chuong 1 tts.pptNguyenNM
 
093049ov10.pptx
093049ov10.pptx093049ov10.pptx
093049ov10.pptxNguyenNM
 
093049ov5.pptx
093049ov5.pptx093049ov5.pptx
093049ov5.pptxNguyenNM
 

More from NguyenNM (6)

SRWE_Module_12.pptx
SRWE_Module_12.pptxSRWE_Module_12.pptx
SRWE_Module_12.pptx
 
SRWE_Module_14.pptx
SRWE_Module_14.pptxSRWE_Module_14.pptx
SRWE_Module_14.pptx
 
readme_vap902.pdf
readme_vap902.pdfreadme_vap902.pdf
readme_vap902.pdf
 
chuong 1 tts.ppt
chuong 1 tts.pptchuong 1 tts.ppt
chuong 1 tts.ppt
 
093049ov10.pptx
093049ov10.pptx093049ov10.pptx
093049ov10.pptx
 
093049ov5.pptx
093049ov5.pptx093049ov5.pptx
093049ov5.pptx
 

Recently uploaded

(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxhumanexperienceaaa
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 

Recently uploaded (20)

(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 

093049ov16.pptx

  • 1. Copyright (c) 2019 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org Troubleshooting Security Issues 1 • Troubleshoot Identity and Access Issues • Troubleshoot Attacks • Troubleshoot Other Security Issues
  • 2. Copyright (c) 2019 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org Authentication Issues 2 • First determine if the problem is truly authentication and not some other problem with the cloud network, the device, or the application. • See if someone else can authenticate. • If no one can authenticate by using one method, then see if users can authenticate by using some other method. • Also try, if available, a different authentication protocol, such as Kerberos, NTLM, smart card/token, MS-CHAP v2 (for remote access), and more. • Check the Event Viewer logs or error messages to see if there is any indication of the problem.
  • 3. Copyright (c) 2019 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org Authorization Issues 3
  • 4. Copyright (c) 2019 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org Federation and SSO Issues 4 There are some potential issues with SSO and federation that you need to consider before implementing these systems. • How the system will provision and de-provision user accounts. • How a user is allowed to reset their passwords.
  • 5. Copyright (c) 2019 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org Certificate Issues 5 Issue Description Unencrypted credentials Credentials are sent over the network unencrypted, or they are stored in cleartext form. Certificate issues Digital certificates are invalid, insecure, or non-functional. Key management issues Encryption keys are inaccessible to authorized personnel or accessible to unauthorized personnel.
  • 6. Copyright (c) 2019 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org Incorrect Identity and Access Hardening Settings 6 • Personnel: The most common use for IAM is to define identities for organizational employees. Likewise, personnel identities are among the most popular attack vectors. • Endpoints: The devices that people use to gain legitimate access to your network are varied and often difficult to account for in an IAM system. This is especially true of mobile devices like smartphones, tablets, and laptops. • Software: Like servers, applications and services can be uniquely identified in the organization through digital certificates. One unique issue with applications is how to determine which other entities are allowed to run certain apps. • Roles: Roles support the identities of various assets by defining the resources an asset has permission to access based on the function that asset fulfills. Role-based identity can have poorly defined roles that can lead to privilege creep.
  • 7. Copyright (c) 2019 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org Guidelines for Troubleshooting Identity and Access Issues 7 • When users experience authentication issues, first try to determine if the issue is related to something else instead. • When an issue occurs, determine if it affects other users or just one. • Consider how the system will provision and de-provision user accounts when using SSO and federation before implementing these systems. • Consider how users will reset their passwords when using SSO before implementing these systems. • Consider how non-user assets in your organization fit into your IAM scheme.
  • 8. Copyright (c) 2019 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org Activity: Troubleshooting Identity and Access Issues 8 • Your manager at Rudison Technologies poses different scenarios to you and asks what troubleshooting steps you would take to troubleshoot identity and access issues.
  • 9. Copyright (c) 2019 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org External Attacks 9 1. Attacker executes automated signup script on cloud provider 4. Distributed cloud resources overload target server 2. Virtual resources provisioned to individual accounts 3. Attacker consolidates control over virtual environments
  • 10. Copyright (c) 2019 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org Internal Attacks 10 Issue Description Policy violation Personnel violate your organization's policy and engage in unacceptable use of systems, data, and the network. Social media and personal messaging use Personnel use social media and personal messaging accounts in ways that bring risk to the organization. Social engineering Personnel fall victim to social engineering attacks and divulge sensitive information or give access to unauthorized users. Insider threat Disgruntled or otherwise malicious personnel use their unique knowledge of the organization to exploit it for personal gain.
  • 11. Copyright (c) 2019 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org Privilege Escalation 11 • Vertical • User can perform functions not normally assigned to their role or explicitly permitted. • Example: Normal user gains access to admin rights. • Horizontal • User can access or modify specific resources they are not entitled to. • Example: Normal user gains access to other users’ private data. User A User B Admin Horizontal
  • 12. Copyright (c) 2019 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org Attack Vectors Related to Configuration 12 Although the paths that attackers take are diverse, there are three general elements that can contribute to an attack vector: • Vulnerabilities: Attackers will almost always search for holes within your systems and networks. • Exploits: These almost always depend on vulnerabilities to be effective. When the gap in security is identified, the attacker can launch a tool or utility to take advantage of that gap. • Techniques: An attack's technique provides more detail about the path it takes, as well as how it operates. It can also help categorize the effects of an exploit payload.
  • 13. Copyright (c) 2019 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org Guidelines for Troubleshooting Attacks 13 • Consider familiarizing yourself with different types of attacks on clouds so that you will be better prepared to recognize and troubleshoot them. • Remember that attacks don't come from outside your organization only; they can come from inside your organization as well. • User accounts can be a source of multiple attacks, so ensure you have good user management in place to mitigate this. • Understand the vectors that attackers take as this is a crucial step in security because it helps the practitioner identify the how of an attack.
  • 14. Copyright (c) 2019 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org Activity: Troubleshooting Attacks 14 • Your manager at Rudison Technologies poses different scenarios to you and asks what troubleshooting steps you would take to troubleshoot attack issues.
  • 15. Copyright (c) 2019 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org Unencrypted Communication 15 Some steps to help encrypt communications are: • Ensure that you are using secure remote protocols like SSH. • Ensure that you are using SSL/TLS to secure web-based communications. • Ensure that users know not to store passwords in unencrypted text, spreadsheet, or database files. • Ensure that any custom apps you develop employ encryption for data at rest, in transit, and in use.
  • 16. Copyright (c) 2019 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org Unauthorized Physical Access 16 Physical Resource Vulnerabilities Building and grounds • Location • Physical access control Devices • Servers • Laptops and tablets • Mobile phones • Other wireless devices Communications • Telecommunications • Service providers • Wireless cells
  • 17. Copyright (c) 2019 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org Unencrypted Data 17 Unencrypted data is vulnerable regardless of where it is located.
  • 18. Copyright (c) 2019 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org Weak or Obsolete Security Technologies 18 • Securing your environment is a good accomplishment but only if it is done well and maintained. • When implementing security, ensure that you are following best practices and using settings that provide adequate security. • Even when you implement good security, you may still not maintain the level of protection you want. • You need to periodically review your security settings and also review new vulnerabilities so that you can then implement changes to keep your environment safe.
  • 19. Copyright (c) 2019 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org Insufficient Security Controls and Processes 19 • Having insufficient security controls can leave your environment open to attacks. • These can range from physical controls such as locks, to technical controls such as anti-malware or firewalls. • Having insufficient security processes can leave your environment open to attacks even if you have good security controls in place. • Security processes include items such as security governance, policy management, awareness and education, identity and access management, vulnerability management, and incident response.
  • 20. Copyright (c) 2019 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org Tunneling or Encryption Issues 20 • Tunneling with a protocol such as SSH, or using a VPN, can provide access to your cloud from another network. • While these provide a useful service they can also create potential issues. • Tunneling can be used to "sneak through" a firewall by wrapping a protocol that the firewall would normally block inside a protocol that the firewall does not block.
  • 21. Copyright (c) 2019 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org Security Device Failure 21 Network Device Issues Access point Access points are incorrectly authenticating users or are non-functional. Firewall Firewalls fail to prevent unwanted traffic from entering or leaving the network, or block legitimate traffic from entering or leaving the network. Content filter The content filter blocks legitimate content, or fails to block undesirable content. Intrusion detection system (IDS) The IDS frequently encounters false positives and false negatives.
  • 22. Copyright (c) 2019 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org Guidelines for Troubleshooting Other Security Issues 22 • Always encrypt your communications to prevent attackers from gaining important information like account passwords. • Remember that your physical security is as important as your virtual security as it will keep intruders from gaining access to your organization and your staff. • Remember that unencrypted data is vulnerable regardless of where it is located. • Ensure you are implementing adequate security settings when you secure your environment so that you have the level of security you require. • Review your security settings and new vulnerabilities on a periodic basis to discover new attack vectors that you can then implement security for. • Ensure that your security controls are adequate for your environment to avoid additional security issues. • Ensure that you implement adequate security controls to further protect your organization and avoid security or potential legal issues.
  • 23. Copyright (c) 2019 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org Activity: Troubleshooting Other Security Issues 23 • Your manager at Rudison Technologies poses different scenarios to you and asks what troubleshooting steps you would take to troubleshoot other security issues.
  • 24. Reflective Questions Copyright (c) 2019 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org Reflective Questions 1. What types of attacks have you had to deal with in your environment? How did you detect them and stop them? 2. What other security issues have you identified in your environment? 24