Lecture 2 - Network Security Flashcards
Basic Network Definition
Set of devices connected together.
Four points of network security
Hint: SAMS
Scalability (grow in users)
Availability (continuous)
Manageability (Staff able to manage)
Security (Not after thought)
Seven Domains of IT infra
- User
- Workstation
- LAN
- LAN to WAN
- WAN
- Remote Access
- System/App
User domain
Any individual associated with the org, with or without logins.
User Domain Threats
Social engineering/phishing
Workstation domain
Workstations/standalone systems and home computers.
Workstation domain threats
Malware, port scanning, default pass, unpatched OS
LAN Domain
Hosts on private LANs
LAN to WAN Domain
Routers/firewalls at LAN/WAN connection point
2 LAN to WAN Domain threats
Port scanning
DOS
LAN to WAN Domain vulnerabilities
Weak permeter security, default config, misconfig
LAN to WAN domain risks
Instability and malicious traffic
Remote Access Domain
Org resources via remote access
Remote Access Domain Threats
Malware, rogue access point
Remote Access Domain vulnerabilities
Unencrypted wireless, weak security controls
Remote Access Domain Risks
Compromise of remote sys results in org compromise
WAN Domain
Routers, switches and firewalls that ensure connectivity between LANs
WAN Domain Threats (2 things)
Eavesdropping, Unpredictable availability
WAN domain Vulnerability
DNS Poisoning
WAN Domain Risks
Attacks on DNS root, clear text traffic intercepted, disaster
Sys/ App Domain
Servers, apps, databases etc
Sys/App domain Threats
SQL injection, XSS, DoS
Sys/App domain vulnerabilities
Unpatched OS, misconfig, insecure code
Sys/App Domain Risks
Instability, Data loss, loss of function
Network Analysis Steps
- Create network baseline using Nmap/Zenmap
- Capture data at specific points on net
- Analyse captured data
- Investigate/resolve, update baseline,
Security Controls 3 sections
Physical
Procedural
Technical
Physical Controls
- Door locks, guards etc
- Fire detection and suppression, other environmental
- Electrical grounding etc
Procedural Controls
- Policies/procedures
- Insurance
- Background and financial checks
- Data loss prevention
- Awareness training
Technical Controls
- Login ID
- TImeouts
- Logs and audit trails
- Firewalls and routers
- Encryption/Public Key Infrastructure