SlideShare a Scribd company logo
1 of 35
Proprietary & Confidential
@GoCyberSec | January 2020
Chapter 4
Securing Your Network
CompTIA Security +
Proprietary & Confidential
@GoCyberSec | January 2020
Introduction
• Exploring advanced security devices
• Securing wireless networks
• Understanding wireless attacks
• Using VPNs for remote access
Proprietary & Confidential
@GoCyberSec | January 2020
Understanding IDSs and IPSs
• Intrusion Detection System (IDS)
–Detective control
–Attempts to detect attacks after they occur
• Firewall is a preventive control
–Attempts to prevent the attacks before they occur
• Intrusion Prevent System (IPS)
–A preventive control
–Will stop an attack in progress.
Proprietary & Confidential
@GoCyberSec | January 2020
Packet Sniffing
• Also called protocol analyzer
• Captures and analyzes network traffic
• Wireshark – free packet sniffer
• IDSs and IPSs include packet sniffing capabilities
Proprietary & Confidential
@GoCyberSec | January 2020
Host- and Network-Based IDS
HIDS
• Additional software on a workstation or server
• Can detect attacks on the local system
• Protects local resources on the host such as operating system
files
• Cannot monitor network traffic
Proprietary & Confidential
@GoCyberSec | January 2020
Host- and Network-Based IDS
NIDS
• Installed on network devices, such as routers or firewalls
• Monitors network traffic
• Can detect network-based attacks such as smurf attacks
• Cannot monitor encrypted traffic and cannot monitor traffic on
individual hosts.
Proprietary & Confidential
@GoCyberSec | January 2020
Sensor and Collector Placement
Proprietary & Confidential
@GoCyberSec | January 2020
IDS Detection Methods
Signature-Based
• Also called definition-based
• Use a database of predefined traffic patterns (such as CVE list)
• Keep signature files up-to-date
• Most basic form of detection
• Easiest to implement
Proprietary & Confidential
@GoCyberSec | January 2020
IDS Detection Methods
Heuristic-, behavior-based
• Also called anomaly-based
• Starts with a performance baseline of normal behavior
• IDS compares activity against this baseline
• Alerts on traffic anomalies
• Update the baseline if the environment changes
https://www.youtube.com/watch?v=RwWM0srLSg0
Proprietary & Confidential
@GoCyberSec | January 2020
IDS Considerations
• Data sources and trends
• Reporting
• IDS thresholds
• False positives
• Increase administrator’s workload
• False negatives
• No report during an incident
Proprietary & Confidential
@GoCyberSec | January 2020
IDS Considerations
Passive
• Notifies
• Pop-up window
• Central monitor
• E-mail
• Page
• Text message
Active
• Notifies
• Modifies environment
–Modify ACLs
–Close processes
–Divert the attack
Counterattacks
• Don’t do it
–Attackers are dedicated
–Attackers have unlimited time
Proprietary & Confidential
@GoCyberSec | January 2020
IDS vs IPS
• IPS is a preventive control
–Can actively monitor data streams
–Can detect malicious content
–Can stop attacks in progress
• IPS is placed in line with traffic
–IDS is out-of-band
Proprietary & Confidential
@GoCyberSec | January 2020
SSL / TLS Tools
• SSL decryptors
–Placed in DMZ between users and Internet
–Allows inspection of content
Proprietary & Confidential
@GoCyberSec | January 2020
Other Tools
• Honeypots and Honeynets
–Used to divert an attacker
–Allow IT administrators an opportunity to observe
methodologies
–Can be useful to observe zero day exploits
• 802.1x port security
–Provides port-based authentication
–Prevents rogue devices from connecting
Proprietary & Confidential
@GoCyberSec | January 2020
Honey Pot
Proprietary & Confidential
@GoCyberSec | January 2020
Securing Wireless Networks
• WAPS and wireless routers
• All wireless routers are WAPs
• Not all WAPs are wireless routers
Proprietary & Confidential
@GoCyberSec | January 2020
Wireless Routers
Proprietary & Confidential
@GoCyberSec | January 2020
Access Point SSID
• Network name
• Change default SSID
• Disabling SSID broadcast
– Hides from some devices
– Does not hide from attackers
Proprietary & Confidential
@GoCyberSec | January 2020
MAC Filtering
Proprietary & Confidential
@GoCyberSec | January 2020
Network Architecture and Zones
• Wireless
–Provides wireless devices access to wired networks
• Guest
–Typically provides Internet access to guests
–Rarely gives access to network resources
• Ad hoc
–Network between two or more wireless networks
–As needed
Proprietary & Confidential
@GoCyberSec | January 2020
Wireless Cryptographic Protocols
• WPA – Interim replacement for WEP
–Deprecated
• WPA2 – Current standard
–Provides best security when used with CCMP
• TKIP
–Older encryption protocol used with WPA
• CCMP
–Based on AES
–Recommended to be used with WPA2
Proprietary & Confidential
@GoCyberSec | January 2020
Enterprise Mode
• Adds strong authentication
• Uses an 802.1X server (implemented as a RADIUS server) to add
authentication
• RADIUS server
– RADIUS port
– Shared secret
– Similar to a password
Proprietary & Confidential
@GoCyberSec | January 2020
Enterprise Mode
Proprietary & Confidential
@GoCyberSec | January 2020
Wireless Attacks
• Disassociation attack
– Removes a wireless client from a wireless network
• WPS
– Streamlines process of configuring wireless clients
• WPS attack
– Brute force method to discover WPS PIN
– Reaver
Proprietary & Confidential
@GoCyberSec | January 2020
Wireless Attacks
• Rogue access points
– Unauthorized AP
• Evil twins
– Rogue AP with same SSID as legitimate AP
Proprietary & Confidential
@GoCyberSec | January 2020
Bluetooth Wireless
• Bluejacking
– Unauthorized sending of text messages from a Bluetooth device
• Bluesnarfing
– Unauthorized access to or theft of information from a Bluetooth
device
• Bluebugging
– Allows an attacker to take over a mobile phone
Proprietary & Confidential
@GoCyberSec | January 2020
Wireless Attacks
• Wireless replay attacks
– Captures data
– Attempts to use to impersonate client
• RFID attacks
– Sniffing or eavesdropping
– Replay
– DoS
• Misconfigured Access Points
– Use WPA2 with CCMP
– Disable WPS
Proprietary & Confidential
@GoCyberSec | January 2020
Exploring Remote Access
• VPNs and VPN concentrators
Proprietary & Confidential
@GoCyberSec | January 2020
VPN Tunnel Comparisons
• Split tunnel
– Encrypts only some traffic (such as traffic going to private network)
• Full tunnel
– Encrypts all traffic from client
– Can route client traffic through UTM in private network for
monitoring and protection
Proprietary & Confidential
@GoCyberSec | January 2020
Site-to-Site VPNs
• Gateways as VPN servers
Proprietary & Confidential
@GoCyberSec | January 2020
Always-On VPNs
• Site-to-site VPNs
• Regular VPNs for users
• Mobile devices
Proprietary & Confidential
@GoCyberSec | January 2020
Identity and Access Services
RADIUS
Proprietary & Confidential
@GoCyberSec | January 2020
Network Access Control
• Health agents
– Inspects clients for predefined conditions
– Restricts access of unhealthy clients to a remediation network
– Used for VPN clients and internal clients
Proprietary & Confidential
@GoCyberSec | January 2020
AAA Protocols
• Provide authentication, authorization, and accounting
– Authentication verifies a user’s identification
– Authorization provides access
– Accounting tracks user access with logs
Proprietary & Confidential
@GoCyberSec | January 2020
Chapter 4 Summary
• Exploring advanced security devices
• Securing wireless networks
• Understanding wireless attacks
• Using VPNs for remote access

More Related Content

What's hot

Siber Güvenlik ve Etik Hacking Sunu - 4
Siber Güvenlik ve Etik Hacking Sunu - 4Siber Güvenlik ve Etik Hacking Sunu - 4
Siber Güvenlik ve Etik Hacking Sunu - 4Murat KARA
 
Siber Güvenlik ve Etik Hacking Sunu - 1
Siber Güvenlik ve Etik Hacking Sunu - 1Siber Güvenlik ve Etik Hacking Sunu - 1
Siber Güvenlik ve Etik Hacking Sunu - 1Murat KARA
 
10 palo alto nat policy concepts
10 palo alto nat policy concepts10 palo alto nat policy concepts
10 palo alto nat policy conceptsMostafa El Lathy
 
Ransomware: History, Analysis, & Mitigation - PDF
Ransomware: History, Analysis, & Mitigation - PDFRansomware: History, Analysis, & Mitigation - PDF
Ransomware: History, Analysis, & Mitigation - PDFAndy Thompson
 
16 palo alto ssl decryption policy concept
16 palo alto ssl decryption policy concept16 palo alto ssl decryption policy concept
16 palo alto ssl decryption policy conceptMostafa El Lathy
 
CISSP Prep: Ch 5. Communication and Network Security (Part 1)
CISSP Prep: Ch 5. Communication and Network Security (Part 1)CISSP Prep: Ch 5. Communication and Network Security (Part 1)
CISSP Prep: Ch 5. Communication and Network Security (Part 1)Sam Bowne
 
Siber Saldırı Aracı Olarak DDoS
Siber Saldırı Aracı Olarak DDoSSiber Saldırı Aracı Olarak DDoS
Siber Saldırı Aracı Olarak DDoSBGA Cyber Security
 
Penetrasyon Testlerinde Açık Kod Yazılımların Kullanımı
Penetrasyon Testlerinde Açık Kod Yazılımların KullanımıPenetrasyon Testlerinde Açık Kod Yazılımların Kullanımı
Penetrasyon Testlerinde Açık Kod Yazılımların KullanımıBGA Cyber Security
 
Siber Güvenlik ve Etik Hacking Sunu - 10
Siber Güvenlik ve Etik Hacking Sunu - 10Siber Güvenlik ve Etik Hacking Sunu - 10
Siber Güvenlik ve Etik Hacking Sunu - 10Murat KARA
 
7 palo alto security zones & interfaces concepts
7 palo alto security zones & interfaces concepts7 palo alto security zones & interfaces concepts
7 palo alto security zones & interfaces conceptsMostafa El Lathy
 
Siber Güvenlik ve Etik Hacking Sunu - 9
Siber Güvenlik ve Etik Hacking Sunu - 9Siber Güvenlik ve Etik Hacking Sunu - 9
Siber Güvenlik ve Etik Hacking Sunu - 9Murat KARA
 
Introduction to red team operations
Introduction to red team operationsIntroduction to red team operations
Introduction to red team operationsSunny Neo
 
Siber Güvenlik ve Etik Hacking Sunu - 3
Siber Güvenlik ve Etik Hacking Sunu - 3Siber Güvenlik ve Etik Hacking Sunu - 3
Siber Güvenlik ve Etik Hacking Sunu - 3Murat KARA
 
Siber Güvenlik ve Etik Hacking Sunu - 7
Siber Güvenlik ve Etik Hacking Sunu - 7Siber Güvenlik ve Etik Hacking Sunu - 7
Siber Güvenlik ve Etik Hacking Sunu - 7Murat KARA
 
6 pan-os software update & downgrade instruction
6 pan-os software update & downgrade instruction6 pan-os software update & downgrade instruction
6 pan-os software update & downgrade instructionMostafa El Lathy
 
Network security - Defense in Depth
Network security - Defense in DepthNetwork security - Defense in Depth
Network security - Defense in DepthDilum Bandara
 
Siber Güvenlik ve Etik Hacking Sunu - 11
Siber Güvenlik ve Etik Hacking Sunu - 11Siber Güvenlik ve Etik Hacking Sunu - 11
Siber Güvenlik ve Etik Hacking Sunu - 11Murat KARA
 

What's hot (20)

Siber Güvenlik ve Etik Hacking Sunu - 4
Siber Güvenlik ve Etik Hacking Sunu - 4Siber Güvenlik ve Etik Hacking Sunu - 4
Siber Güvenlik ve Etik Hacking Sunu - 4
 
Siber Güvenlik ve Etik Hacking Sunu - 1
Siber Güvenlik ve Etik Hacking Sunu - 1Siber Güvenlik ve Etik Hacking Sunu - 1
Siber Güvenlik ve Etik Hacking Sunu - 1
 
10 palo alto nat policy concepts
10 palo alto nat policy concepts10 palo alto nat policy concepts
10 palo alto nat policy concepts
 
Ransomware: History, Analysis, & Mitigation - PDF
Ransomware: History, Analysis, & Mitigation - PDFRansomware: History, Analysis, & Mitigation - PDF
Ransomware: History, Analysis, & Mitigation - PDF
 
16 palo alto ssl decryption policy concept
16 palo alto ssl decryption policy concept16 palo alto ssl decryption policy concept
16 palo alto ssl decryption policy concept
 
CISSP Prep: Ch 5. Communication and Network Security (Part 1)
CISSP Prep: Ch 5. Communication and Network Security (Part 1)CISSP Prep: Ch 5. Communication and Network Security (Part 1)
CISSP Prep: Ch 5. Communication and Network Security (Part 1)
 
Siber Saldırı Aracı Olarak DDoS
Siber Saldırı Aracı Olarak DDoSSiber Saldırı Aracı Olarak DDoS
Siber Saldırı Aracı Olarak DDoS
 
Penetrasyon Testlerinde Açık Kod Yazılımların Kullanımı
Penetrasyon Testlerinde Açık Kod Yazılımların KullanımıPenetrasyon Testlerinde Açık Kod Yazılımların Kullanımı
Penetrasyon Testlerinde Açık Kod Yazılımların Kullanımı
 
Chapter 5 - Identity Management
Chapter 5 - Identity ManagementChapter 5 - Identity Management
Chapter 5 - Identity Management
 
Siber Güvenlik ve Etik Hacking Sunu - 10
Siber Güvenlik ve Etik Hacking Sunu - 10Siber Güvenlik ve Etik Hacking Sunu - 10
Siber Güvenlik ve Etik Hacking Sunu - 10
 
7 palo alto security zones & interfaces concepts
7 palo alto security zones & interfaces concepts7 palo alto security zones & interfaces concepts
7 palo alto security zones & interfaces concepts
 
Palo alto-review
Palo alto-reviewPalo alto-review
Palo alto-review
 
Siber Güvenlik ve Etik Hacking Sunu - 9
Siber Güvenlik ve Etik Hacking Sunu - 9Siber Güvenlik ve Etik Hacking Sunu - 9
Siber Güvenlik ve Etik Hacking Sunu - 9
 
Introduction to red team operations
Introduction to red team operationsIntroduction to red team operations
Introduction to red team operations
 
Siber Güvenlik ve Etik Hacking Sunu - 3
Siber Güvenlik ve Etik Hacking Sunu - 3Siber Güvenlik ve Etik Hacking Sunu - 3
Siber Güvenlik ve Etik Hacking Sunu - 3
 
Fortigate Training
Fortigate TrainingFortigate Training
Fortigate Training
 
Siber Güvenlik ve Etik Hacking Sunu - 7
Siber Güvenlik ve Etik Hacking Sunu - 7Siber Güvenlik ve Etik Hacking Sunu - 7
Siber Güvenlik ve Etik Hacking Sunu - 7
 
6 pan-os software update & downgrade instruction
6 pan-os software update & downgrade instruction6 pan-os software update & downgrade instruction
6 pan-os software update & downgrade instruction
 
Network security - Defense in Depth
Network security - Defense in DepthNetwork security - Defense in Depth
Network security - Defense in Depth
 
Siber Güvenlik ve Etik Hacking Sunu - 11
Siber Güvenlik ve Etik Hacking Sunu - 11Siber Güvenlik ve Etik Hacking Sunu - 11
Siber Güvenlik ve Etik Hacking Sunu - 11
 

Similar to 501 ch 4 securing your network

501 ch 5 securing hosts and data
501 ch 5 securing hosts and data501 ch 5 securing hosts and data
501 ch 5 securing hosts and datagocybersec
 
501 ch 7 protecting against advanced attacks
501 ch 7 protecting against advanced attacks501 ch 7 protecting against advanced attacks
501 ch 7 protecting against advanced attacksgocybersec
 
501 ch 2 understanding iam
501 ch 2 understanding iam501 ch 2 understanding iam
501 ch 2 understanding iamgocybersec
 
DEF CON 23 - vivek ramachadran - chellam
DEF CON 23 - vivek ramachadran - chellamDEF CON 23 - vivek ramachadran - chellam
DEF CON 23 - vivek ramachadran - chellamFelipe Prado
 
Open and Secure SCADA: Efficient and Economical Control, Without the Risk
Open and Secure SCADA: Efficient and Economical Control, Without the RiskOpen and Secure SCADA: Efficient and Economical Control, Without the Risk
Open and Secure SCADA: Efficient and Economical Control, Without the RiskInductive Automation
 
Open and Secure SCADA: Efficient and Economical Control, Without the Risk
Open and Secure SCADA: Efficient and Economical Control, Without the RiskOpen and Secure SCADA: Efficient and Economical Control, Without the Risk
Open and Secure SCADA: Efficient and Economical Control, Without the RiskInductive Automation
 
CIRA Labs - Secure Home Gateway Project 2019-03.pptx
CIRA Labs - Secure Home Gateway Project 2019-03.pptxCIRA Labs - Secure Home Gateway Project 2019-03.pptx
CIRA Labs - Secure Home Gateway Project 2019-03.pptxssuserfb92ae
 
Setting Up InfluxDB for IoT by David G Simmons
Setting Up InfluxDB for IoT by David G SimmonsSetting Up InfluxDB for IoT by David G Simmons
Setting Up InfluxDB for IoT by David G SimmonsInfluxData
 
RightScale Webinar: Security and Compliance in the Cloud
RightScale Webinar: Security and Compliance in the CloudRightScale Webinar: Security and Compliance in the Cloud
RightScale Webinar: Security and Compliance in the CloudRightScale
 
Trust No-One Architecture For Services And Data
Trust No-One Architecture For Services And DataTrust No-One Architecture For Services And Data
Trust No-One Architecture For Services And DataAidan Finn
 
Secure Your Web Applications and Achieve Compliance
Secure Your Web Applications and Achieve Compliance Secure Your Web Applications and Achieve Compliance
Secure Your Web Applications and Achieve Compliance Avi Networks
 
Slide share device to iot solution – a blueprint
Slide share   device to iot solution – a blueprintSlide share   device to iot solution – a blueprint
Slide share device to iot solution – a blueprintGuy Vinograd ☁
 
501 ch 1 mastering security basics
501 ch 1 mastering security basics501 ch 1 mastering security basics
501 ch 1 mastering security basicsgocybersec
 
501 ch 4 securing your network
501 ch 4 securing your network501 ch 4 securing your network
501 ch 4 securing your networkgocybersec
 
PLNOG 13: B. van der Sloot, S. Abdel-Hafez: Running a 2 Tbps global IP networ...
PLNOG 13: B. van der Sloot, S. Abdel-Hafez: Running a 2 Tbps global IP networ...PLNOG 13: B. van der Sloot, S. Abdel-Hafez: Running a 2 Tbps global IP networ...
PLNOG 13: B. van der Sloot, S. Abdel-Hafez: Running a 2 Tbps global IP networ...PROIDEA
 
IT Application Services & Management | SoftClouds
IT Application Services & Management | SoftCloudsIT Application Services & Management | SoftClouds
IT Application Services & Management | SoftCloudsSoftClouds LLC
 

Similar to 501 ch 4 securing your network (20)

501 ch 5 securing hosts and data
501 ch 5 securing hosts and data501 ch 5 securing hosts and data
501 ch 5 securing hosts and data
 
501 ch 7 protecting against advanced attacks
501 ch 7 protecting against advanced attacks501 ch 7 protecting against advanced attacks
501 ch 7 protecting against advanced attacks
 
501 ch 2 understanding iam
501 ch 2 understanding iam501 ch 2 understanding iam
501 ch 2 understanding iam
 
DEF CON 23 - vivek ramachadran - chellam
DEF CON 23 - vivek ramachadran - chellamDEF CON 23 - vivek ramachadran - chellam
DEF CON 23 - vivek ramachadran - chellam
 
Open and Secure SCADA: Efficient and Economical Control, Without the Risk
Open and Secure SCADA: Efficient and Economical Control, Without the RiskOpen and Secure SCADA: Efficient and Economical Control, Without the Risk
Open and Secure SCADA: Efficient and Economical Control, Without the Risk
 
Open and Secure SCADA: Efficient and Economical Control, Without the Risk
Open and Secure SCADA: Efficient and Economical Control, Without the RiskOpen and Secure SCADA: Efficient and Economical Control, Without the Risk
Open and Secure SCADA: Efficient and Economical Control, Without the Risk
 
chapter-1_iot.pptx
chapter-1_iot.pptxchapter-1_iot.pptx
chapter-1_iot.pptx
 
IOT UNIT 1B.ppt
IOT UNIT 1B.pptIOT UNIT 1B.ppt
IOT UNIT 1B.ppt
 
CIRA Labs - Secure Home Gateway Project 2019-03.pptx
CIRA Labs - Secure Home Gateway Project 2019-03.pptxCIRA Labs - Secure Home Gateway Project 2019-03.pptx
CIRA Labs - Secure Home Gateway Project 2019-03.pptx
 
Setting Up InfluxDB for IoT by David G Simmons
Setting Up InfluxDB for IoT by David G SimmonsSetting Up InfluxDB for IoT by David G Simmons
Setting Up InfluxDB for IoT by David G Simmons
 
RightScale Webinar: Security and Compliance in the Cloud
RightScale Webinar: Security and Compliance in the CloudRightScale Webinar: Security and Compliance in the Cloud
RightScale Webinar: Security and Compliance in the Cloud
 
intro to iot.pdf
intro to iot.pdfintro to iot.pdf
intro to iot.pdf
 
Trust No-One Architecture For Services And Data
Trust No-One Architecture For Services And DataTrust No-One Architecture For Services And Data
Trust No-One Architecture For Services And Data
 
Secure Your Web Applications and Achieve Compliance
Secure Your Web Applications and Achieve Compliance Secure Your Web Applications and Achieve Compliance
Secure Your Web Applications and Achieve Compliance
 
Slide share device to iot solution – a blueprint
Slide share   device to iot solution – a blueprintSlide share   device to iot solution – a blueprint
Slide share device to iot solution – a blueprint
 
501 ch 1 mastering security basics
501 ch 1 mastering security basics501 ch 1 mastering security basics
501 ch 1 mastering security basics
 
501 ch 4 securing your network
501 ch 4 securing your network501 ch 4 securing your network
501 ch 4 securing your network
 
Shradhamaheshwari vpn
Shradhamaheshwari vpnShradhamaheshwari vpn
Shradhamaheshwari vpn
 
PLNOG 13: B. van der Sloot, S. Abdel-Hafez: Running a 2 Tbps global IP networ...
PLNOG 13: B. van der Sloot, S. Abdel-Hafez: Running a 2 Tbps global IP networ...PLNOG 13: B. van der Sloot, S. Abdel-Hafez: Running a 2 Tbps global IP networ...
PLNOG 13: B. van der Sloot, S. Abdel-Hafez: Running a 2 Tbps global IP networ...
 
IT Application Services & Management | SoftClouds
IT Application Services & Management | SoftCloudsIT Application Services & Management | SoftClouds
IT Application Services & Management | SoftClouds
 

More from gocybersec

501 ch 3 network technologies and tools
501 ch 3 network technologies and tools501 ch 3 network technologies and tools
501 ch 3 network technologies and toolsgocybersec
 
501 ch 10 understanding cryptography and pki
501 ch 10 understanding cryptography and pki501 ch 10 understanding cryptography and pki
501 ch 10 understanding cryptography and pkigocybersec
 
501 ch 9 implementing controls to protect assets
501 ch 9 implementing controls to protect assets501 ch 9 implementing controls to protect assets
501 ch 9 implementing controls to protect assetsgocybersec
 
501 ch 8 risk managment tool
501 ch 8 risk managment tool501 ch 8 risk managment tool
501 ch 8 risk managment toolgocybersec
 
501 ch 7 advanced attacks
501 ch 7 advanced attacks501 ch 7 advanced attacks
501 ch 7 advanced attacksgocybersec
 
501 ch 11 operational security
501 ch 11 operational security501 ch 11 operational security
501 ch 11 operational securitygocybersec
 
501 ch 9 implementing controls
501 ch 9 implementing controls501 ch 9 implementing controls
501 ch 9 implementing controlsgocybersec
 
501 ch 8 risk management tools
501 ch 8 risk management tools501 ch 8 risk management tools
501 ch 8 risk management toolsgocybersec
 
501 ch 6 threats vulnerabilities attacks
501 ch 6 threats vulnerabilities attacks501 ch 6 threats vulnerabilities attacks
501 ch 6 threats vulnerabilities attacksgocybersec
 
501 ch 7 advanced attacks
501 ch 7 advanced attacks501 ch 7 advanced attacks
501 ch 7 advanced attacksgocybersec
 
501 ch 5 securing hosts and data
501 ch 5 securing hosts and data501 ch 5 securing hosts and data
501 ch 5 securing hosts and datagocybersec
 
501 ch 3 network technologies tools
501 ch 3 network technologies tools501 ch 3 network technologies tools
501 ch 3 network technologies toolsgocybersec
 
501 ch 2 understanding iam
501 ch 2 understanding iam501 ch 2 understanding iam
501 ch 2 understanding iamgocybersec
 

More from gocybersec (13)

501 ch 3 network technologies and tools
501 ch 3 network technologies and tools501 ch 3 network technologies and tools
501 ch 3 network technologies and tools
 
501 ch 10 understanding cryptography and pki
501 ch 10 understanding cryptography and pki501 ch 10 understanding cryptography and pki
501 ch 10 understanding cryptography and pki
 
501 ch 9 implementing controls to protect assets
501 ch 9 implementing controls to protect assets501 ch 9 implementing controls to protect assets
501 ch 9 implementing controls to protect assets
 
501 ch 8 risk managment tool
501 ch 8 risk managment tool501 ch 8 risk managment tool
501 ch 8 risk managment tool
 
501 ch 7 advanced attacks
501 ch 7 advanced attacks501 ch 7 advanced attacks
501 ch 7 advanced attacks
 
501 ch 11 operational security
501 ch 11 operational security501 ch 11 operational security
501 ch 11 operational security
 
501 ch 9 implementing controls
501 ch 9 implementing controls501 ch 9 implementing controls
501 ch 9 implementing controls
 
501 ch 8 risk management tools
501 ch 8 risk management tools501 ch 8 risk management tools
501 ch 8 risk management tools
 
501 ch 6 threats vulnerabilities attacks
501 ch 6 threats vulnerabilities attacks501 ch 6 threats vulnerabilities attacks
501 ch 6 threats vulnerabilities attacks
 
501 ch 7 advanced attacks
501 ch 7 advanced attacks501 ch 7 advanced attacks
501 ch 7 advanced attacks
 
501 ch 5 securing hosts and data
501 ch 5 securing hosts and data501 ch 5 securing hosts and data
501 ch 5 securing hosts and data
 
501 ch 3 network technologies tools
501 ch 3 network technologies tools501 ch 3 network technologies tools
501 ch 3 network technologies tools
 
501 ch 2 understanding iam
501 ch 2 understanding iam501 ch 2 understanding iam
501 ch 2 understanding iam
 

Recently uploaded

A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 

Recently uploaded (20)

A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 

501 ch 4 securing your network

  • 1. Proprietary & Confidential @GoCyberSec | January 2020 Chapter 4 Securing Your Network CompTIA Security +
  • 2. Proprietary & Confidential @GoCyberSec | January 2020 Introduction • Exploring advanced security devices • Securing wireless networks • Understanding wireless attacks • Using VPNs for remote access
  • 3. Proprietary & Confidential @GoCyberSec | January 2020 Understanding IDSs and IPSs • Intrusion Detection System (IDS) –Detective control –Attempts to detect attacks after they occur • Firewall is a preventive control –Attempts to prevent the attacks before they occur • Intrusion Prevent System (IPS) –A preventive control –Will stop an attack in progress.
  • 4. Proprietary & Confidential @GoCyberSec | January 2020 Packet Sniffing • Also called protocol analyzer • Captures and analyzes network traffic • Wireshark – free packet sniffer • IDSs and IPSs include packet sniffing capabilities
  • 5. Proprietary & Confidential @GoCyberSec | January 2020 Host- and Network-Based IDS HIDS • Additional software on a workstation or server • Can detect attacks on the local system • Protects local resources on the host such as operating system files • Cannot monitor network traffic
  • 6. Proprietary & Confidential @GoCyberSec | January 2020 Host- and Network-Based IDS NIDS • Installed on network devices, such as routers or firewalls • Monitors network traffic • Can detect network-based attacks such as smurf attacks • Cannot monitor encrypted traffic and cannot monitor traffic on individual hosts.
  • 7. Proprietary & Confidential @GoCyberSec | January 2020 Sensor and Collector Placement
  • 8. Proprietary & Confidential @GoCyberSec | January 2020 IDS Detection Methods Signature-Based • Also called definition-based • Use a database of predefined traffic patterns (such as CVE list) • Keep signature files up-to-date • Most basic form of detection • Easiest to implement
  • 9. Proprietary & Confidential @GoCyberSec | January 2020 IDS Detection Methods Heuristic-, behavior-based • Also called anomaly-based • Starts with a performance baseline of normal behavior • IDS compares activity against this baseline • Alerts on traffic anomalies • Update the baseline if the environment changes https://www.youtube.com/watch?v=RwWM0srLSg0
  • 10. Proprietary & Confidential @GoCyberSec | January 2020 IDS Considerations • Data sources and trends • Reporting • IDS thresholds • False positives • Increase administrator’s workload • False negatives • No report during an incident
  • 11. Proprietary & Confidential @GoCyberSec | January 2020 IDS Considerations Passive • Notifies • Pop-up window • Central monitor • E-mail • Page • Text message Active • Notifies • Modifies environment –Modify ACLs –Close processes –Divert the attack Counterattacks • Don’t do it –Attackers are dedicated –Attackers have unlimited time
  • 12. Proprietary & Confidential @GoCyberSec | January 2020 IDS vs IPS • IPS is a preventive control –Can actively monitor data streams –Can detect malicious content –Can stop attacks in progress • IPS is placed in line with traffic –IDS is out-of-band
  • 13. Proprietary & Confidential @GoCyberSec | January 2020 SSL / TLS Tools • SSL decryptors –Placed in DMZ between users and Internet –Allows inspection of content
  • 14. Proprietary & Confidential @GoCyberSec | January 2020 Other Tools • Honeypots and Honeynets –Used to divert an attacker –Allow IT administrators an opportunity to observe methodologies –Can be useful to observe zero day exploits • 802.1x port security –Provides port-based authentication –Prevents rogue devices from connecting
  • 15. Proprietary & Confidential @GoCyberSec | January 2020 Honey Pot
  • 16. Proprietary & Confidential @GoCyberSec | January 2020 Securing Wireless Networks • WAPS and wireless routers • All wireless routers are WAPs • Not all WAPs are wireless routers
  • 17. Proprietary & Confidential @GoCyberSec | January 2020 Wireless Routers
  • 18. Proprietary & Confidential @GoCyberSec | January 2020 Access Point SSID • Network name • Change default SSID • Disabling SSID broadcast – Hides from some devices – Does not hide from attackers
  • 19. Proprietary & Confidential @GoCyberSec | January 2020 MAC Filtering
  • 20. Proprietary & Confidential @GoCyberSec | January 2020 Network Architecture and Zones • Wireless –Provides wireless devices access to wired networks • Guest –Typically provides Internet access to guests –Rarely gives access to network resources • Ad hoc –Network between two or more wireless networks –As needed
  • 21. Proprietary & Confidential @GoCyberSec | January 2020 Wireless Cryptographic Protocols • WPA – Interim replacement for WEP –Deprecated • WPA2 – Current standard –Provides best security when used with CCMP • TKIP –Older encryption protocol used with WPA • CCMP –Based on AES –Recommended to be used with WPA2
  • 22. Proprietary & Confidential @GoCyberSec | January 2020 Enterprise Mode • Adds strong authentication • Uses an 802.1X server (implemented as a RADIUS server) to add authentication • RADIUS server – RADIUS port – Shared secret – Similar to a password
  • 23. Proprietary & Confidential @GoCyberSec | January 2020 Enterprise Mode
  • 24. Proprietary & Confidential @GoCyberSec | January 2020 Wireless Attacks • Disassociation attack – Removes a wireless client from a wireless network • WPS – Streamlines process of configuring wireless clients • WPS attack – Brute force method to discover WPS PIN – Reaver
  • 25. Proprietary & Confidential @GoCyberSec | January 2020 Wireless Attacks • Rogue access points – Unauthorized AP • Evil twins – Rogue AP with same SSID as legitimate AP
  • 26. Proprietary & Confidential @GoCyberSec | January 2020 Bluetooth Wireless • Bluejacking – Unauthorized sending of text messages from a Bluetooth device • Bluesnarfing – Unauthorized access to or theft of information from a Bluetooth device • Bluebugging – Allows an attacker to take over a mobile phone
  • 27. Proprietary & Confidential @GoCyberSec | January 2020 Wireless Attacks • Wireless replay attacks – Captures data – Attempts to use to impersonate client • RFID attacks – Sniffing or eavesdropping – Replay – DoS • Misconfigured Access Points – Use WPA2 with CCMP – Disable WPS
  • 28. Proprietary & Confidential @GoCyberSec | January 2020 Exploring Remote Access • VPNs and VPN concentrators
  • 29. Proprietary & Confidential @GoCyberSec | January 2020 VPN Tunnel Comparisons • Split tunnel – Encrypts only some traffic (such as traffic going to private network) • Full tunnel – Encrypts all traffic from client – Can route client traffic through UTM in private network for monitoring and protection
  • 30. Proprietary & Confidential @GoCyberSec | January 2020 Site-to-Site VPNs • Gateways as VPN servers
  • 31. Proprietary & Confidential @GoCyberSec | January 2020 Always-On VPNs • Site-to-site VPNs • Regular VPNs for users • Mobile devices
  • 32. Proprietary & Confidential @GoCyberSec | January 2020 Identity and Access Services RADIUS
  • 33. Proprietary & Confidential @GoCyberSec | January 2020 Network Access Control • Health agents – Inspects clients for predefined conditions – Restricts access of unhealthy clients to a remediation network – Used for VPN clients and internal clients
  • 34. Proprietary & Confidential @GoCyberSec | January 2020 AAA Protocols • Provide authentication, authorization, and accounting – Authentication verifies a user’s identification – Authorization provides access – Accounting tracks user access with logs
  • 35. Proprietary & Confidential @GoCyberSec | January 2020 Chapter 4 Summary • Exploring advanced security devices • Securing wireless networks • Understanding wireless attacks • Using VPNs for remote access