4.5 Given a scenario, modify enterprise capabilities to enhance security Flashcards

1
Q

Ports and Protocols - CRITICAL

A
  • Port Classifications (managed by IANA):
    • Well-Known Ports (0-1023): Common protocols (e.g., HTTP).
    • Registered Ports (1024-49151): Vendor-specific.
    • Dynamic/Private Ports (49152-65535): Temporary outbound connections.
  • Port 21: FTP (File Transfer Protocol) - TCP
  • Port 22: SSH, SCP, SFTP - TCP
  • Port 23: Telnet - TCP
  • Port 25: SMTP - TCP
  • Port 53: DNS - TCP/UDP
  • Port 69: TFTP (Trivial File Transfer Protocol) lightweight file transfer for sending config files or network booting of an operating system - UDP
  • Port 80: HTTP - TCP
  • Port 88: Kerberos - network auth protocol UDP
  • Port 110: POP3 - TCP
  • Port 119: NNTP (Network News Transfer Protocol - accessing newsgroups) - TCP
  • Port 135: RPC (Remote Procedure Call) communication between different system processes - TCP/UDP
  • Ports 137-139: NetBIOS - used in Win to share files, printers names TCP/UDP
  • Port 143: IMAP - TCP
  • Port 161: SNMP (Simple Network Management Protocol) - manages network devices- UDP
  • Port 162: SNMPTrap - UDP
  • Port 389: LDAP (Lightweight Directory Access Protocol) - directory services- TCP
  • Port 443: HTTPS - TCP
  • Port 445: SMB (Server Message Block) - file and printer sharing - TCP
  • Ports 465, 587: SMTPS (SMTP Secure, see smtp) - TCP
  • Port 514: Syslog - sending log messages UDP
  • Port 636: LDAPS (LDAP Secure) - TCP
  • Port 993: IMAPS (IMAP over SSL/TLS) - TCP
  • Port 995: POP3S (POP3 over SSL/TLS) - TCP
  • Port 1433: Microsoft SQL - TCP
  • Ports 1645, 1646: RADIUS (Remote Authentication) remote auth, authorization and accounting - TCP
  • Ports 1812, 1813: RADIUS (for UDP) - UDP
  • Port 3389: RDP (Remote Desktop Protocol) - TCP
  • Port 6514: Syslog TLS - TCP
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Network Access Control (NAC)

A
  • NAC: Ensures only secure devices access the network, scanning for threats before granting access. Inspects clients for health, such as having up-to-date antivirus software
    • Applies to both internal and remote devices (e.g., VPN connections)
    • Implemented as hardware or software
  • NAC Agent Types:
    • Persistent Agent: Installed on corporate-owned devices
    • Dissolvable
    • Agentless
  • 802.1x Standard:
    • Port-based access control; foundation for modern NAC
  • Rule-Based Access Control (NAC Enhancements):
    • Time-Based
    • Location-Based
    • Role-Based: Adjust access based on device role (adaptive NAC)
    • Logical Rules: Use conditions to define complex admission policies
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Web and DNS Filtering

A
  • Types of Web Filtering:
    • Agent-Based: Installed on devices; enforces policies for remote workers
    • Centralized Proxy
    • URL Scanning: Blocks known malicious URLs
    • Content Categorization: Allows or blocks sites by category (e.g., social media)
    • Block Rules: Custom rules to prevent access to risky websites
    • Reputation-Based Filtering: Uses reputation scores to block sites hosting malware or phishing
  • DNS Filtering: Prevents access by blocking domain name resolution to IP addresses
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Email Security

A
  • Key Email Security Techniques:
    • SPF (Sender Policy Framework):
      • Verifies sender’s IP matches authorized IPs in DNS records
    • DKIM (DomainKeys Identified Mail):
      • Adds digital signatures to verify email source and integrity
    • DMARC (Domain-based Message Authentication, Reporting, and Conformance):
      • Sets policies for failed DKIM/SPF checks
      • Works with DKIM, SPF, or both
      • Examples:
        • Policy set to “p=none”: Monitors email but takes no action
        • Policy set to “p=quarantine”: Suspicious emails go to the spam folder
        • Policy set to “p=reject”: Blocks emails that fail authentication
  • Email Gateway Configuration: on-premises, cloud, hybrid
  • Spam Filtering: Detects unwanted emails and moves them to the spam folder
    • Techniques:
      • Content analysis and Bayesian filtering
      • DNS-based sinkhole lists and email filtering rules
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Endpoint Detection and Response (EDR) and Extended Detection and Response (XDR)

A
  • How EDR Works:
    • Data Collection: Gathers data from processes, registry changes, memory, and network traffic
    • Data Consolidation: Sends data to a central security system
    • Threat Detection: Uses signature-based and behavioral detection
    • Alerts and Response: Creates alerts and initiates remediation actions
    • Investigation Tools: Provides detailed timelines and forensic insights
    • Remediation: Removes malware and restores systems to normal
  • Extended Detection and Response (XDR):
    • Security strategy!
    • Integrates across email, endpoints, cloud, servers, and networks
    • Provides multi-layer threat detection for quicker response
  • File Integrity Monitoring (FIM) (part of both EDR and XDR):
    • Compares files with a known baseline to detect unauthorized changes
  • EDR vs. XDR, IDS, and IPS:
    • EDR: Focuses on endpoint monitoring
    • XDR: Expands beyond endpoints to include networks, cloud, and email, providing a unified security platform
    • IDS (Intrusion Detection System): Monitors network traffic but takes no action
    • IPS (Intrusion Prevention System): Detects and blocks malicious traffic in real-time
    • Key Differences:
      • EDR: Endpoint-focused with detection and response tools
      • XDR: Comprehensive solution for multi-layer threat correlation
      • IDS/IPS: Focuses mainly on network traffic
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

User Behavior Analytics (UBA)

A
  • UBA: Uses big data and machine learning to analyze user behavior for security threats
    • Identifies patterns and anomalies in user activity to detect potential risks
  • UEBA: Extends UBA to monitor entities (e.g., routers, servers, endpoints) along with user accounts
    • Detects anomalies across both users and systems
  • Key Aspects:
    • Behavior Baselines: UBA establishes normal behavior baselines to identify deviations
    • Machine Learning: Detects unusual behavior that may indicate a threat
    • Data Sources: Processes data from network traffic, devices, and logs
    • Alerts: Generates alerts for anomalies for investigation by security teams
  • Benefits of UBA/UEBA:
    • Early Threat Detection
    • Insider Threat Detection
    • Improved Incident Response
How well did you know this?
1
Not at all
2
3
4
5
Perfectly