2.3 Given a scenario, troubleshoot common security issues. Flashcards
Unencrypted Credentials/Clear Text
Many Internet technologies and protocols do not encrypt network traffic by default, including the username and password when logging on to the device. Be sure to use encryption technologies such as SSL/TLS, VPNs, or secure versions of protocols when possible.
Logs and Events Anomalies
When looking at your event logs and activity logs, be sure to watch for abnormal events that appear in the log. Any suspicious activity needs to be investigated further. From a misconfiguration point of view, verify that logging is enabled and that you know where the logs are stored for your system and devices.
Permission Issues
Not configuring proper permissions on resources is a common reason why internal attacks are so successful. Be sure to review resource permissions on a regular basis and only give permissions that are needed (principle of least privilege).
Access Violations
An access violation occurs when someone who is not authorized to access a system gains access. Make sure to require authentication before anyone can gain access to a network or system, and make sure that logon traffic is encrypted. Configure permissions on resources to make sure that no one can gain access to a resource who should not get access.
Certificate Issues
Certificates are electronic files that contain keys used to encrypt communication. Certificates should be used to secure web traffic, e-mail traffic, and server-to-server communication, at the least. Be sure that the certificates being used have not expired, have not been revoked, and are from a trusted certificate authority.
Data Exfiltration
Data exfiltration occurs when someone transfers data from a computer without permission to do so. To prevent data exfiltration, you can disable USB ports so that portable storage cannot be connected to a system, or you can use data loss prevention (DLP) features to block sensitive data from being copied or e-mailed outside the organization.
Misconfigured Devices
Device misconfiguration is a big reason why attackers are able to gain access to systems they should not be able to access.
Misconfigured Devices - Firewall
Ensure that firewalls are used to break the network into different network segments. A firewall with misconfigured rules allows users to access network segments they shouldn’t have access to. Make sure that each network segment’s firewall is properly configured to control what traffic can pass through the firewall to reach that specific network segment.
Misconfigured Devices - Content Filter
Content filtering devices are used to control which content on the Internet employees can access. If content filtering rules are not configured properly, users could be visiting non-safe sites and have code execute on their systems.
Misconfigured Devices - Access Points
Wireless access points and wireless home routers are commonly misconfigured. Be sure to review the configuration of your wireless access points and ensure that you have configured features such as MAC filtering, WPA2 encryption, and a strong encryption key, and that you have modified the default admin password.
Weak Security Configuration
A big reason for security incidents is weak security configuration. For example, a network admin may configure encryption on the wireless network but choose a weaker encryption method or maybe use a weak encryption key. Be sure to review all security settings on devices, such as access control lists, passwords, encryption keys, encryption algorithms, and any filtering features that may be available.
Personnel Issues
You can configure the best security settings on your devices and they may still be easy to hack into if you do not focus on training employees to be security aware. You must also be vigilant of insider threats.
Personnel Issues - Policy Violation
Many security incidents occur because employees violate company security policies. Be sure to educate employees on security policies and why they are in effect. Employees are less likely to violate security policies if they understand why the policies exist and how adherence to them protects the company and its assets.
Personnel Issues - Insider Threat
Most companies focus on firewalls as their security protection. That is important, of course, but you also need to protect company assets from insider threats such as disgruntled employees. Be sure to use authentication, permissions, and access control lists to control what employees have access to. Also, be sure to implement antimalware software to protect your internal systems from viruses.
Personnel Issues - Social Engineering
Educate employees on common social engineering attacks so that they can identify when they are being targeted by social engineering. Education is the key to protecting against social engineering attacks.