SlideShare a Scribd company logo
Proprietary & Confidential
@GoCyberSec | January 2020
Chapter 4
Securing Your Network
CompTIA Security +
Proprietary & Confidential
@GoCyberSec | January 2020
Introduction
• Exploring advanced security devices
• Securing wireless networks
• Understanding wireless attacks
• Using VPNs for remote access
Proprietary & Confidential
@GoCyberSec | January 2020
Understanding IDSs and IPSs
• Intrusion Detection System (IDS)
–Detective control
–Attempts to detect attacks after they occur
• Firewall is a preventive control
–Attempts to prevent the attacks before they occur
• Intrusion Prevent System (IPS)
–A preventive control
–Will stop an attack in progress.
Proprietary & Confidential
@GoCyberSec | January 2020
Packet Sniffing
• Also called protocol analyzer
• Captures and analyzes network traffic
• Wireshark – free packet sniffer
• IDSs and IPSs include packet sniffing capabilities
Proprietary & Confidential
@GoCyberSec | January 2020
Host- and Network-Based IDS
HIDS
• Additional software on a workstation or server
• Can detect attacks on the local system
• Protects local resources on the host such as operating system
files
• Cannot monitor network traffic
Proprietary & Confidential
@GoCyberSec | January 2020
Host- and Network-Based IDS
NIDS
• Installed on network devices, such as routers or firewalls
• Monitors network traffic
• Can detect network-based attacks such as smurf attacks
• Cannot monitor encrypted traffic and cannot monitor traffic on
individual hosts.
Proprietary & Confidential
@GoCyberSec | January 2020
Sensor and Collector Placement
Proprietary & Confidential
@GoCyberSec | January 2020
IDS Detection Methods
Signature-Based
• Also called definition-based
• Use a database of predefined traffic patterns (such as CVE list)
• Keep signature files up-to-date
• Most basic form of detection
• Easiest to implement
Proprietary & Confidential
@GoCyberSec | January 2020
IDS Detection Methods
Heuristic-, behavior-based
• Also called anomaly-based
• Starts with a performance baseline of normal behavior
• IDS compares activity against this baseline
• Alerts on traffic anomalies
• Update the baseline if the environment changes
https://www.youtube.com/watch?v=RwWM0srLSg0
Proprietary & Confidential
@GoCyberSec | January 2020
IDS Considerations
• Data sources and trends
• Reporting
• IDS thresholds
• False positives
• Increase administrator’s workload
• False negatives
• No report during an incident
Proprietary & Confidential
@GoCyberSec | January 2020
IDS Considerations
Passive
• Notifies
• Pop-up window
• Central monitor
• E-mail
• Page
• Text message
Active
• Notifies
• Modifies environment
–Modify ACLs
–Close processes
–Divert the attack
Counterattacks
• Don’t do it
–Attackers are dedicated
–Attackers have unlimited time
Proprietary & Confidential
@GoCyberSec | January 2020
IDS vs IPS
• IPS is a preventive control
–Can actively monitor data streams
–Can detect malicious content
–Can stop attacks in progress
• IPS is placed in line with traffic
–IDS is out-of-band
Proprietary & Confidential
@GoCyberSec | January 2020
SSL / TLS Tools
• SSL decryptors
–Placed in DMZ between users and Internet
–Allows inspection of content
Proprietary & Confidential
@GoCyberSec | January 2020
Other Tools
• Honeypots and Honeynets
–Used to divert an attacker
–Allow IT administrators an opportunity to observe
methodologies
–Can be useful to observe zero day exploits
• 802.1x port security
–Provides port-based authentication
–Prevents rogue devices from connecting
Proprietary & Confidential
@GoCyberSec | January 2020
Honey Pot
Proprietary & Confidential
@GoCyberSec | January 2020
Securing Wireless Networks
• WAPS and wireless routers
• All wireless routers are WAPs
• Not all WAPs are wireless routers
Proprietary & Confidential
@GoCyberSec | January 2020
Wireless Routers
Proprietary & Confidential
@GoCyberSec | January 2020
Access Point SSID
• Network name
• Change default SSID
• Disabling SSID broadcast
– Hides from some devices
– Does not hide from attackers
Proprietary & Confidential
@GoCyberSec | January 2020
MAC Filtering
Proprietary & Confidential
@GoCyberSec | January 2020
Network Architecture and Zones
• Wireless
–Provides wireless devices access to wired networks
• Guest
–Typically provides Internet access to guests
–Rarely gives access to network resources
• Ad hoc
–Network between two or more wireless networks
–As needed
Proprietary & Confidential
@GoCyberSec | January 2020
Wireless Cryptographic Protocols
• WPA – Interim replacement for WEP
–Deprecated
• WPA2 – Current standard
–Provides best security when used with CCMP
• TKIP
–Older encryption protocol used with WPA
• CCMP
–Based on AES
–Recommended to be used with WPA2
Proprietary & Confidential
@GoCyberSec | January 2020
Enterprise Mode
• Adds strong authentication
• Uses an 802.1X server (implemented as a RADIUS server) to add
authentication
• RADIUS server
– RADIUS port
– Shared secret
– Similar to a password
Proprietary & Confidential
@GoCyberSec | January 2020
Enterprise Mode
Proprietary & Confidential
@GoCyberSec | January 2020
Wireless Attacks
• Disassociation attack
– Removes a wireless client from a wireless network
• WPS
– Streamlines process of configuring wireless clients
• WPS attack
– Brute force method to discover WPS PIN
– Reaver
Proprietary & Confidential
@GoCyberSec | January 2020
Wireless Attacks
• Rogue access points
– Unauthorized AP
• Evil twins
– Rogue AP with same SSID as legitimate AP
Proprietary & Confidential
@GoCyberSec | January 2020
Bluetooth Wireless
• Bluejacking
– Unauthorized sending of text messages from a Bluetooth device
• Bluesnarfing
– Unauthorized access to or theft of information from a Bluetooth
device
• Bluebugging
– Allows an attacker to take over a mobile phone
Proprietary & Confidential
@GoCyberSec | January 2020
Wireless Attacks
• Wireless replay attacks
– Captures data
– Attempts to use to impersonate client
• RFID attacks
– Sniffing or eavesdropping
– Replay
– DoS
• Misconfigured Access Points
– Use WPA2 with CCMP
– Disable WPS
Proprietary & Confidential
@GoCyberSec | January 2020
Exploring Remote Access
• VPNs and VPN concentrators
Proprietary & Confidential
@GoCyberSec | January 2020
VPN Tunnel Comparisons
• Split tunnel
– Encrypts only some traffic (such as traffic going to private network)
• Full tunnel
– Encrypts all traffic from client
– Can route client traffic through UTM in private network for
monitoring and protection
Proprietary & Confidential
@GoCyberSec | January 2020
Site-to-Site VPNs
• Gateways as VPN servers
Proprietary & Confidential
@GoCyberSec | January 2020
Always-On VPNs
• Site-to-site VPNs
• Regular VPNs for users
• Mobile devices
Proprietary & Confidential
@GoCyberSec | January 2020
Identity and Access Services
RADIUS
Proprietary & Confidential
@GoCyberSec | January 2020
Network Access Control
• Health agents
– Inspects clients for predefined conditions
– Restricts access of unhealthy clients to a remediation network
– Used for VPN clients and internal clients
Proprietary & Confidential
@GoCyberSec | January 2020
AAA Protocols
• Provide authentication, authorization, and accounting
– Authentication verifies a user’s identification
– Authorization provides access
– Accounting tracks user access with logs
Proprietary & Confidential
@GoCyberSec | January 2020
Chapter 4 Summary
• Exploring advanced security devices
• Securing wireless networks
• Understanding wireless attacks
• Using VPNs for remote access

More Related Content

What's hot

Wired and Wireless Network Forensics
Wired and Wireless Network ForensicsWired and Wireless Network Forensics
Wired and Wireless Network Forensics
Savvius, Inc
 
DDoS Engelleme Ürünleri
DDoS Engelleme ÜrünleriDDoS Engelleme Ürünleri
DDoS Engelleme Ürünleri
BGA Cyber Security
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hacking
Raghav Bisht
 
Cloud security privacy- org
Cloud security  privacy- orgCloud security  privacy- org
Cloud security privacy- org
Dharmalingam S
 
DoS ve DDoS Saldırıları ve Korunma Yöntemleri
DoS ve DDoS Saldırıları ve Korunma YöntemleriDoS ve DDoS Saldırıları ve Korunma Yöntemleri
DoS ve DDoS Saldırıları ve Korunma YöntemleriBGA Cyber Security
 
VPN - Virtual Private Network
VPN - Virtual Private NetworkVPN - Virtual Private Network
VPN - Virtual Private Network
Peter R. Egli
 
Intrusion Prevention System
Intrusion Prevention SystemIntrusion Prevention System
Intrusion Prevention System
Vishwanath Badiger
 
Applied Detection and Analysis Using Flow Data - MIRCon 2014
Applied Detection and Analysis Using Flow Data - MIRCon 2014Applied Detection and Analysis Using Flow Data - MIRCon 2014
Applied Detection and Analysis Using Flow Data - MIRCon 2014
chrissanders88
 
CREST CCT Exam Prep Notes
CREST CCT Exam Prep NotesCREST CCT Exam Prep Notes
CREST CCT Exam Prep Notes
NathanAn
 
Zero Trust and Data Security
Zero Trust and Data SecurityZero Trust and Data Security
Zero Trust and Data Security
Career Communications Group
 
Snort IPS(Intrusion Prevention System) Eğitimi
Snort IPS(Intrusion Prevention System) EğitimiSnort IPS(Intrusion Prevention System) Eğitimi
Snort IPS(Intrusion Prevention System) EğitimiBGA Cyber Security
 
Port Scanning
Port ScanningPort Scanning
Port Scanning
amiable_indian
 
NMAP - The Network Scanner
NMAP - The Network ScannerNMAP - The Network Scanner
NMAP - The Network Scanner
n|u - The Open Security Community
 
Open source network forensics and advanced pcap analysis
Open source network forensics and advanced pcap analysisOpen source network forensics and advanced pcap analysis
Open source network forensics and advanced pcap analysis
GTKlondike
 
Snort
SnortSnort
Data breach presentation
Data breach presentationData breach presentation
Data breach presentation
Bradford Bach
 
Snort
SnortSnort
Bsides 2019 - Intelligent Threat Hunting
Bsides 2019 - Intelligent Threat HuntingBsides 2019 - Intelligent Threat Hunting
Bsides 2019 - Intelligent Threat Hunting
Dhruv Majumdar
 
Ch 4: Footprinting and Social Engineering
Ch 4: Footprinting and Social EngineeringCh 4: Footprinting and Social Engineering
Ch 4: Footprinting and Social Engineering
Sam Bowne
 
MITRE ATT&CK Framework
MITRE ATT&CK FrameworkMITRE ATT&CK Framework
MITRE ATT&CK Framework
n|u - The Open Security Community
 

What's hot (20)

Wired and Wireless Network Forensics
Wired and Wireless Network ForensicsWired and Wireless Network Forensics
Wired and Wireless Network Forensics
 
DDoS Engelleme Ürünleri
DDoS Engelleme ÜrünleriDDoS Engelleme Ürünleri
DDoS Engelleme Ürünleri
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hacking
 
Cloud security privacy- org
Cloud security  privacy- orgCloud security  privacy- org
Cloud security privacy- org
 
DoS ve DDoS Saldırıları ve Korunma Yöntemleri
DoS ve DDoS Saldırıları ve Korunma YöntemleriDoS ve DDoS Saldırıları ve Korunma Yöntemleri
DoS ve DDoS Saldırıları ve Korunma Yöntemleri
 
VPN - Virtual Private Network
VPN - Virtual Private NetworkVPN - Virtual Private Network
VPN - Virtual Private Network
 
Intrusion Prevention System
Intrusion Prevention SystemIntrusion Prevention System
Intrusion Prevention System
 
Applied Detection and Analysis Using Flow Data - MIRCon 2014
Applied Detection and Analysis Using Flow Data - MIRCon 2014Applied Detection and Analysis Using Flow Data - MIRCon 2014
Applied Detection and Analysis Using Flow Data - MIRCon 2014
 
CREST CCT Exam Prep Notes
CREST CCT Exam Prep NotesCREST CCT Exam Prep Notes
CREST CCT Exam Prep Notes
 
Zero Trust and Data Security
Zero Trust and Data SecurityZero Trust and Data Security
Zero Trust and Data Security
 
Snort IPS(Intrusion Prevention System) Eğitimi
Snort IPS(Intrusion Prevention System) EğitimiSnort IPS(Intrusion Prevention System) Eğitimi
Snort IPS(Intrusion Prevention System) Eğitimi
 
Port Scanning
Port ScanningPort Scanning
Port Scanning
 
NMAP - The Network Scanner
NMAP - The Network ScannerNMAP - The Network Scanner
NMAP - The Network Scanner
 
Open source network forensics and advanced pcap analysis
Open source network forensics and advanced pcap analysisOpen source network forensics and advanced pcap analysis
Open source network forensics and advanced pcap analysis
 
Snort
SnortSnort
Snort
 
Data breach presentation
Data breach presentationData breach presentation
Data breach presentation
 
Snort
SnortSnort
Snort
 
Bsides 2019 - Intelligent Threat Hunting
Bsides 2019 - Intelligent Threat HuntingBsides 2019 - Intelligent Threat Hunting
Bsides 2019 - Intelligent Threat Hunting
 
Ch 4: Footprinting and Social Engineering
Ch 4: Footprinting and Social EngineeringCh 4: Footprinting and Social Engineering
Ch 4: Footprinting and Social Engineering
 
MITRE ATT&CK Framework
MITRE ATT&CK FrameworkMITRE ATT&CK Framework
MITRE ATT&CK Framework
 

Similar to 501 ch 4 securing your network

501 ch 5 securing hosts and data
501 ch 5 securing hosts and data501 ch 5 securing hosts and data
501 ch 5 securing hosts and data
gocybersec
 
501 ch 7 protecting against advanced attacks
501 ch 7 protecting against advanced attacks501 ch 7 protecting against advanced attacks
501 ch 7 protecting against advanced attacks
gocybersec
 
501 ch 2 understanding iam
501 ch 2 understanding iam501 ch 2 understanding iam
501 ch 2 understanding iam
gocybersec
 
DEF CON 23 - vivek ramachadran - chellam
DEF CON 23 - vivek ramachadran - chellamDEF CON 23 - vivek ramachadran - chellam
DEF CON 23 - vivek ramachadran - chellam
Felipe Prado
 
Open and Secure SCADA: Efficient and Economical Control, Without the Risk
Open and Secure SCADA: Efficient and Economical Control, Without the RiskOpen and Secure SCADA: Efficient and Economical Control, Without the Risk
Open and Secure SCADA: Efficient and Economical Control, Without the Risk
Inductive Automation
 
Open and Secure SCADA: Efficient and Economical Control, Without the Risk
Open and Secure SCADA: Efficient and Economical Control, Without the RiskOpen and Secure SCADA: Efficient and Economical Control, Without the Risk
Open and Secure SCADA: Efficient and Economical Control, Without the Risk
Inductive Automation
 
chapter-1_iot.pptx
chapter-1_iot.pptxchapter-1_iot.pptx
chapter-1_iot.pptx
RAHULRAJ438202
 
IOT UNIT 1B.ppt
IOT UNIT 1B.pptIOT UNIT 1B.ppt
IOT UNIT 1B.ppt
madhavanmohan1
 
CIRA Labs - Secure Home Gateway Project 2019-03.pptx
CIRA Labs - Secure Home Gateway Project 2019-03.pptxCIRA Labs - Secure Home Gateway Project 2019-03.pptx
CIRA Labs - Secure Home Gateway Project 2019-03.pptx
ssuserfb92ae
 
Setting Up InfluxDB for IoT by David G Simmons
Setting Up InfluxDB for IoT by David G SimmonsSetting Up InfluxDB for IoT by David G Simmons
Setting Up InfluxDB for IoT by David G Simmons
InfluxData
 
RightScale Webinar: Security and Compliance in the Cloud
RightScale Webinar: Security and Compliance in the CloudRightScale Webinar: Security and Compliance in the Cloud
RightScale Webinar: Security and Compliance in the Cloud
RightScale
 
intro to iot.pdf
intro to iot.pdfintro to iot.pdf
intro to iot.pdf
DaisyFrancis9
 
Trust No-One Architecture For Services And Data
Trust No-One Architecture For Services And DataTrust No-One Architecture For Services And Data
Trust No-One Architecture For Services And Data
Aidan Finn
 
Secure Your Web Applications and Achieve Compliance
Secure Your Web Applications and Achieve Compliance Secure Your Web Applications and Achieve Compliance
Secure Your Web Applications and Achieve Compliance
Avi Networks
 
Slide share device to iot solution – a blueprint
Slide share   device to iot solution – a blueprintSlide share   device to iot solution – a blueprint
Slide share device to iot solution – a blueprint
Guy Vinograd ☁
 
501 ch 1 mastering security basics
501 ch 1 mastering security basics501 ch 1 mastering security basics
501 ch 1 mastering security basics
gocybersec
 
501 ch 4 securing your network
501 ch 4 securing your network501 ch 4 securing your network
501 ch 4 securing your network
gocybersec
 
Shradhamaheshwari vpn
Shradhamaheshwari vpnShradhamaheshwari vpn
Shradhamaheshwari vpn
Shradha Maheshwari
 
PLNOG 13: B. van der Sloot, S. Abdel-Hafez: Running a 2 Tbps global IP networ...
PLNOG 13: B. van der Sloot, S. Abdel-Hafez: Running a 2 Tbps global IP networ...PLNOG 13: B. van der Sloot, S. Abdel-Hafez: Running a 2 Tbps global IP networ...
PLNOG 13: B. van der Sloot, S. Abdel-Hafez: Running a 2 Tbps global IP networ...
PROIDEA
 
IT Application Services & Management | SoftClouds
IT Application Services & Management | SoftCloudsIT Application Services & Management | SoftClouds
IT Application Services & Management | SoftClouds
SoftClouds LLC
 

Similar to 501 ch 4 securing your network (20)

501 ch 5 securing hosts and data
501 ch 5 securing hosts and data501 ch 5 securing hosts and data
501 ch 5 securing hosts and data
 
501 ch 7 protecting against advanced attacks
501 ch 7 protecting against advanced attacks501 ch 7 protecting against advanced attacks
501 ch 7 protecting against advanced attacks
 
501 ch 2 understanding iam
501 ch 2 understanding iam501 ch 2 understanding iam
501 ch 2 understanding iam
 
DEF CON 23 - vivek ramachadran - chellam
DEF CON 23 - vivek ramachadran - chellamDEF CON 23 - vivek ramachadran - chellam
DEF CON 23 - vivek ramachadran - chellam
 
Open and Secure SCADA: Efficient and Economical Control, Without the Risk
Open and Secure SCADA: Efficient and Economical Control, Without the RiskOpen and Secure SCADA: Efficient and Economical Control, Without the Risk
Open and Secure SCADA: Efficient and Economical Control, Without the Risk
 
Open and Secure SCADA: Efficient and Economical Control, Without the Risk
Open and Secure SCADA: Efficient and Economical Control, Without the RiskOpen and Secure SCADA: Efficient and Economical Control, Without the Risk
Open and Secure SCADA: Efficient and Economical Control, Without the Risk
 
chapter-1_iot.pptx
chapter-1_iot.pptxchapter-1_iot.pptx
chapter-1_iot.pptx
 
IOT UNIT 1B.ppt
IOT UNIT 1B.pptIOT UNIT 1B.ppt
IOT UNIT 1B.ppt
 
CIRA Labs - Secure Home Gateway Project 2019-03.pptx
CIRA Labs - Secure Home Gateway Project 2019-03.pptxCIRA Labs - Secure Home Gateway Project 2019-03.pptx
CIRA Labs - Secure Home Gateway Project 2019-03.pptx
 
Setting Up InfluxDB for IoT by David G Simmons
Setting Up InfluxDB for IoT by David G SimmonsSetting Up InfluxDB for IoT by David G Simmons
Setting Up InfluxDB for IoT by David G Simmons
 
RightScale Webinar: Security and Compliance in the Cloud
RightScale Webinar: Security and Compliance in the CloudRightScale Webinar: Security and Compliance in the Cloud
RightScale Webinar: Security and Compliance in the Cloud
 
intro to iot.pdf
intro to iot.pdfintro to iot.pdf
intro to iot.pdf
 
Trust No-One Architecture For Services And Data
Trust No-One Architecture For Services And DataTrust No-One Architecture For Services And Data
Trust No-One Architecture For Services And Data
 
Secure Your Web Applications and Achieve Compliance
Secure Your Web Applications and Achieve Compliance Secure Your Web Applications and Achieve Compliance
Secure Your Web Applications and Achieve Compliance
 
Slide share device to iot solution – a blueprint
Slide share   device to iot solution – a blueprintSlide share   device to iot solution – a blueprint
Slide share device to iot solution – a blueprint
 
501 ch 1 mastering security basics
501 ch 1 mastering security basics501 ch 1 mastering security basics
501 ch 1 mastering security basics
 
501 ch 4 securing your network
501 ch 4 securing your network501 ch 4 securing your network
501 ch 4 securing your network
 
Shradhamaheshwari vpn
Shradhamaheshwari vpnShradhamaheshwari vpn
Shradhamaheshwari vpn
 
PLNOG 13: B. van der Sloot, S. Abdel-Hafez: Running a 2 Tbps global IP networ...
PLNOG 13: B. van der Sloot, S. Abdel-Hafez: Running a 2 Tbps global IP networ...PLNOG 13: B. van der Sloot, S. Abdel-Hafez: Running a 2 Tbps global IP networ...
PLNOG 13: B. van der Sloot, S. Abdel-Hafez: Running a 2 Tbps global IP networ...
 
IT Application Services & Management | SoftClouds
IT Application Services & Management | SoftCloudsIT Application Services & Management | SoftClouds
IT Application Services & Management | SoftClouds
 

More from gocybersec

501 ch 3 network technologies and tools
501 ch 3 network technologies and tools501 ch 3 network technologies and tools
501 ch 3 network technologies and tools
gocybersec
 
501 ch 10 understanding cryptography and pki
501 ch 10 understanding cryptography and pki501 ch 10 understanding cryptography and pki
501 ch 10 understanding cryptography and pki
gocybersec
 
501 ch 9 implementing controls to protect assets
501 ch 9 implementing controls to protect assets501 ch 9 implementing controls to protect assets
501 ch 9 implementing controls to protect assets
gocybersec
 
501 ch 8 risk managment tool
501 ch 8 risk managment tool501 ch 8 risk managment tool
501 ch 8 risk managment tool
gocybersec
 
501 ch 7 advanced attacks
501 ch 7 advanced attacks501 ch 7 advanced attacks
501 ch 7 advanced attacks
gocybersec
 
501 ch 11 operational security
501 ch 11 operational security501 ch 11 operational security
501 ch 11 operational security
gocybersec
 
501 ch 9 implementing controls
501 ch 9 implementing controls501 ch 9 implementing controls
501 ch 9 implementing controls
gocybersec
 
501 ch 8 risk management tools
501 ch 8 risk management tools501 ch 8 risk management tools
501 ch 8 risk management tools
gocybersec
 
501 ch 6 threats vulnerabilities attacks
501 ch 6 threats vulnerabilities attacks501 ch 6 threats vulnerabilities attacks
501 ch 6 threats vulnerabilities attacks
gocybersec
 
501 ch 7 advanced attacks
501 ch 7 advanced attacks501 ch 7 advanced attacks
501 ch 7 advanced attacks
gocybersec
 
501 ch 5 securing hosts and data
501 ch 5 securing hosts and data501 ch 5 securing hosts and data
501 ch 5 securing hosts and data
gocybersec
 
501 ch 3 network technologies tools
501 ch 3 network technologies tools501 ch 3 network technologies tools
501 ch 3 network technologies tools
gocybersec
 
501 ch 2 understanding iam
501 ch 2 understanding iam501 ch 2 understanding iam
501 ch 2 understanding iam
gocybersec
 
501 ch-1-mastering-security-basics
501 ch-1-mastering-security-basics501 ch-1-mastering-security-basics
501 ch-1-mastering-security-basics
gocybersec
 

More from gocybersec (14)

501 ch 3 network technologies and tools
501 ch 3 network technologies and tools501 ch 3 network technologies and tools
501 ch 3 network technologies and tools
 
501 ch 10 understanding cryptography and pki
501 ch 10 understanding cryptography and pki501 ch 10 understanding cryptography and pki
501 ch 10 understanding cryptography and pki
 
501 ch 9 implementing controls to protect assets
501 ch 9 implementing controls to protect assets501 ch 9 implementing controls to protect assets
501 ch 9 implementing controls to protect assets
 
501 ch 8 risk managment tool
501 ch 8 risk managment tool501 ch 8 risk managment tool
501 ch 8 risk managment tool
 
501 ch 7 advanced attacks
501 ch 7 advanced attacks501 ch 7 advanced attacks
501 ch 7 advanced attacks
 
501 ch 11 operational security
501 ch 11 operational security501 ch 11 operational security
501 ch 11 operational security
 
501 ch 9 implementing controls
501 ch 9 implementing controls501 ch 9 implementing controls
501 ch 9 implementing controls
 
501 ch 8 risk management tools
501 ch 8 risk management tools501 ch 8 risk management tools
501 ch 8 risk management tools
 
501 ch 6 threats vulnerabilities attacks
501 ch 6 threats vulnerabilities attacks501 ch 6 threats vulnerabilities attacks
501 ch 6 threats vulnerabilities attacks
 
501 ch 7 advanced attacks
501 ch 7 advanced attacks501 ch 7 advanced attacks
501 ch 7 advanced attacks
 
501 ch 5 securing hosts and data
501 ch 5 securing hosts and data501 ch 5 securing hosts and data
501 ch 5 securing hosts and data
 
501 ch 3 network technologies tools
501 ch 3 network technologies tools501 ch 3 network technologies tools
501 ch 3 network technologies tools
 
501 ch 2 understanding iam
501 ch 2 understanding iam501 ch 2 understanding iam
501 ch 2 understanding iam
 
501 ch-1-mastering-security-basics
501 ch-1-mastering-security-basics501 ch-1-mastering-security-basics
501 ch-1-mastering-security-basics
 

Recently uploaded

Pengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptxPengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Fajar Baskoro
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
Dr. Mulla Adam Ali
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
Jean Carlos Nunes Paixão
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
chanes7
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
adhitya5119
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
David Douglas School District
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
Nicholas Montgomery
 
Walmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdfWalmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdf
TechSoup
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
Nicholas Montgomery
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
AyyanKhan40
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
Academy of Science of South Africa
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
Celine George
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
heathfieldcps1
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
Nguyen Thanh Tu Collection
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
Celine George
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
Israel Genealogy Research Association
 
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
RitikBhardwaj56
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Excellence Foundation for South Sudan
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
Dr. Shivangi Singh Parihar
 
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPLAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
RAHUL
 

Recently uploaded (20)

Pengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptxPengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptx
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
 
Walmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdfWalmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdf
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
 
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
 
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPLAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
 

501 ch 4 securing your network

  • 1. Proprietary & Confidential @GoCyberSec | January 2020 Chapter 4 Securing Your Network CompTIA Security +
  • 2. Proprietary & Confidential @GoCyberSec | January 2020 Introduction • Exploring advanced security devices • Securing wireless networks • Understanding wireless attacks • Using VPNs for remote access
  • 3. Proprietary & Confidential @GoCyberSec | January 2020 Understanding IDSs and IPSs • Intrusion Detection System (IDS) –Detective control –Attempts to detect attacks after they occur • Firewall is a preventive control –Attempts to prevent the attacks before they occur • Intrusion Prevent System (IPS) –A preventive control –Will stop an attack in progress.
  • 4. Proprietary & Confidential @GoCyberSec | January 2020 Packet Sniffing • Also called protocol analyzer • Captures and analyzes network traffic • Wireshark – free packet sniffer • IDSs and IPSs include packet sniffing capabilities
  • 5. Proprietary & Confidential @GoCyberSec | January 2020 Host- and Network-Based IDS HIDS • Additional software on a workstation or server • Can detect attacks on the local system • Protects local resources on the host such as operating system files • Cannot monitor network traffic
  • 6. Proprietary & Confidential @GoCyberSec | January 2020 Host- and Network-Based IDS NIDS • Installed on network devices, such as routers or firewalls • Monitors network traffic • Can detect network-based attacks such as smurf attacks • Cannot monitor encrypted traffic and cannot monitor traffic on individual hosts.
  • 7. Proprietary & Confidential @GoCyberSec | January 2020 Sensor and Collector Placement
  • 8. Proprietary & Confidential @GoCyberSec | January 2020 IDS Detection Methods Signature-Based • Also called definition-based • Use a database of predefined traffic patterns (such as CVE list) • Keep signature files up-to-date • Most basic form of detection • Easiest to implement
  • 9. Proprietary & Confidential @GoCyberSec | January 2020 IDS Detection Methods Heuristic-, behavior-based • Also called anomaly-based • Starts with a performance baseline of normal behavior • IDS compares activity against this baseline • Alerts on traffic anomalies • Update the baseline if the environment changes https://www.youtube.com/watch?v=RwWM0srLSg0
  • 10. Proprietary & Confidential @GoCyberSec | January 2020 IDS Considerations • Data sources and trends • Reporting • IDS thresholds • False positives • Increase administrator’s workload • False negatives • No report during an incident
  • 11. Proprietary & Confidential @GoCyberSec | January 2020 IDS Considerations Passive • Notifies • Pop-up window • Central monitor • E-mail • Page • Text message Active • Notifies • Modifies environment –Modify ACLs –Close processes –Divert the attack Counterattacks • Don’t do it –Attackers are dedicated –Attackers have unlimited time
  • 12. Proprietary & Confidential @GoCyberSec | January 2020 IDS vs IPS • IPS is a preventive control –Can actively monitor data streams –Can detect malicious content –Can stop attacks in progress • IPS is placed in line with traffic –IDS is out-of-band
  • 13. Proprietary & Confidential @GoCyberSec | January 2020 SSL / TLS Tools • SSL decryptors –Placed in DMZ between users and Internet –Allows inspection of content
  • 14. Proprietary & Confidential @GoCyberSec | January 2020 Other Tools • Honeypots and Honeynets –Used to divert an attacker –Allow IT administrators an opportunity to observe methodologies –Can be useful to observe zero day exploits • 802.1x port security –Provides port-based authentication –Prevents rogue devices from connecting
  • 15. Proprietary & Confidential @GoCyberSec | January 2020 Honey Pot
  • 16. Proprietary & Confidential @GoCyberSec | January 2020 Securing Wireless Networks • WAPS and wireless routers • All wireless routers are WAPs • Not all WAPs are wireless routers
  • 17. Proprietary & Confidential @GoCyberSec | January 2020 Wireless Routers
  • 18. Proprietary & Confidential @GoCyberSec | January 2020 Access Point SSID • Network name • Change default SSID • Disabling SSID broadcast – Hides from some devices – Does not hide from attackers
  • 19. Proprietary & Confidential @GoCyberSec | January 2020 MAC Filtering
  • 20. Proprietary & Confidential @GoCyberSec | January 2020 Network Architecture and Zones • Wireless –Provides wireless devices access to wired networks • Guest –Typically provides Internet access to guests –Rarely gives access to network resources • Ad hoc –Network between two or more wireless networks –As needed
  • 21. Proprietary & Confidential @GoCyberSec | January 2020 Wireless Cryptographic Protocols • WPA – Interim replacement for WEP –Deprecated • WPA2 – Current standard –Provides best security when used with CCMP • TKIP –Older encryption protocol used with WPA • CCMP –Based on AES –Recommended to be used with WPA2
  • 22. Proprietary & Confidential @GoCyberSec | January 2020 Enterprise Mode • Adds strong authentication • Uses an 802.1X server (implemented as a RADIUS server) to add authentication • RADIUS server – RADIUS port – Shared secret – Similar to a password
  • 23. Proprietary & Confidential @GoCyberSec | January 2020 Enterprise Mode
  • 24. Proprietary & Confidential @GoCyberSec | January 2020 Wireless Attacks • Disassociation attack – Removes a wireless client from a wireless network • WPS – Streamlines process of configuring wireless clients • WPS attack – Brute force method to discover WPS PIN – Reaver
  • 25. Proprietary & Confidential @GoCyberSec | January 2020 Wireless Attacks • Rogue access points – Unauthorized AP • Evil twins – Rogue AP with same SSID as legitimate AP
  • 26. Proprietary & Confidential @GoCyberSec | January 2020 Bluetooth Wireless • Bluejacking – Unauthorized sending of text messages from a Bluetooth device • Bluesnarfing – Unauthorized access to or theft of information from a Bluetooth device • Bluebugging – Allows an attacker to take over a mobile phone
  • 27. Proprietary & Confidential @GoCyberSec | January 2020 Wireless Attacks • Wireless replay attacks – Captures data – Attempts to use to impersonate client • RFID attacks – Sniffing or eavesdropping – Replay – DoS • Misconfigured Access Points – Use WPA2 with CCMP – Disable WPS
  • 28. Proprietary & Confidential @GoCyberSec | January 2020 Exploring Remote Access • VPNs and VPN concentrators
  • 29. Proprietary & Confidential @GoCyberSec | January 2020 VPN Tunnel Comparisons • Split tunnel – Encrypts only some traffic (such as traffic going to private network) • Full tunnel – Encrypts all traffic from client – Can route client traffic through UTM in private network for monitoring and protection
  • 30. Proprietary & Confidential @GoCyberSec | January 2020 Site-to-Site VPNs • Gateways as VPN servers
  • 31. Proprietary & Confidential @GoCyberSec | January 2020 Always-On VPNs • Site-to-site VPNs • Regular VPNs for users • Mobile devices
  • 32. Proprietary & Confidential @GoCyberSec | January 2020 Identity and Access Services RADIUS
  • 33. Proprietary & Confidential @GoCyberSec | January 2020 Network Access Control • Health agents – Inspects clients for predefined conditions – Restricts access of unhealthy clients to a remediation network – Used for VPN clients and internal clients
  • 34. Proprietary & Confidential @GoCyberSec | January 2020 AAA Protocols • Provide authentication, authorization, and accounting – Authentication verifies a user’s identification – Authorization provides access – Accounting tracks user access with logs
  • 35. Proprietary & Confidential @GoCyberSec | January 2020 Chapter 4 Summary • Exploring advanced security devices • Securing wireless networks • Understanding wireless attacks • Using VPNs for remote access