MODULE 15 - CERTIFICATION CYBER OPS ASSOCIATE Flashcards

1
Q

Introduction to Network Monitoring

Network Security Topology “All networks are targets” is a common adage used to describe the current landscape of network security.

Therefore, to mitigate threats, all networks must be secured and protected.

A

This requires a defense-in-depth approach.

It requires using proven methods and a security infrastructure consisting of firewalls, intrusion detection systems (IDS), intrusion prevention systems (IPS), and endpoint security software.

These methods and technologies are used to introduce automated monitoring to the network, create security alerts, or automatically block offensive devices when something goes wrong.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

This requires a defense-in-depth approach. It requires using proven methods and a security infrastructure consisting of firewalls, intrusion detection systems (IDS), intrusion prevention systems (IPS), and endpoint security software.

These methods and technologies are used to introduce automated monitoring to the network, create security alerts, or automatically block offensive devices when something goes wrong.

A

However, for large networks, an extra layer of protection must be added. Devices such as firewalls and IPS operate based on pre-configured rules.

They monitor traffic and compare it against the configured rules. If there is a match, the traffic is handled according to the rule.

This works relatively seamlessly. However, sometimes legitimate traffic is mistaken for unauthorized traffic.

Called false positives, these situations require human eyes to see and evaluate them before they can be validated.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

However, for large networks, an extra layer of protection must be added. Devices such as firewalls and IPS operate based on pre-configured rules. They monitor traffic and compare it against the configured rules.

If there is a match, the traffic is handled according to the rule. This works relatively seamlessly.

However, sometimes legitimate traffic is mistaken for unauthorized traffic.

Called false positives, these situations require human eyes to see and evaluate them before they can be validated.

A

An important part of the job of the cybersecurity analyst is to review all alerts generated by network devices and determine the validity of the alerts.

Was that file that was downloaded by user X really malware?

Is that website that was visited by user Y really malicious?

Is the printer on the third floor really compromised because it is trying to connect to a server that is out on the internet?

These are questions that are commonly asked by security analysts daily.

It is their job to determine the correct answers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Network Monitoring Methods

The day-to-day operation of a network consists of common patterns of traffic flow, bandwidth usage, and resource access.

Together, these patterns identify normal network behavior.

Security analysts must be intimately familiar with normal network behavior because abnormal network behavior typically indicates a problem.

A

To determine normal network behavior, network monitoring must be implemented.

Various tools are used to help discover normal network behavior including IDS, packet analyzers, SNMP, NetFlow, and others.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Some of these tools require captured network data.

There are two common methods used to capture traffic and send it to network monitoring devices:

Network taps, sometimes known as test access points (TAPs).

Traffic mirroring using Switch Port Analyzer (SPAN) or other port mirroring.

A

Some of these tools require captured network data.

There are two common methods used to capture traffic and send it to network monitoring devices:

Network taps, sometimes known as test access points (TAPs).

Traffic mirroring using Switch Port Analyzer (SPAN) or other port mirroring.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Network Taps A network tap is typically a passive splitting device implemented inline between a device of interest and the network.

A tap forwards all traffic, including physical layer errors, to an analysis device while also allowing the traffic to reach its intended destination.

The figure displays a sample topology displaying a tap installed between a network firewall and the internal router.

https://snipboard.io/fEvlXW.jpg

A

The figure displays a sample topology displaying a tap installed between a network firewall and the internal router.

https://snipboard.io/fEvlXW.jpg

Notice how the tap simultaneously sends both the transmit (TX) data stream from the internal router and the receive (RX) data stream to the internal router on separate, dedicated channels.

This ensures that all data arrives at the monitoring device in real time.

Therefore, network performance is not affected or degraded by monitoring the connection.

Taps are also typically fail-safe, which means if a tap fails or loses power, traffic between the firewall and internal router is not affected.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The figure displays a sample topology displaying a tap installed between a network firewall and the internal router. https://snipboard.io/fEvlXW.jpg

Notice how the tap simultaneously sends both the transmit (TX) data stream from the internal router and the receive (RX) data stream to the internal router on separate, dedicated channels.

This ensures that all data arrives at the monitoring device in real time. Therefore, network performance is not affected or degraded by monitoring the connection.

A

Taps are also typically fail-safe, which means if a tap fails or loses power, traffic between the firewall and internal router is not affected.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Traffic Mirroring and SPAN Network switches segment the network by design.

This limits the amount of traffic that is visible to network monitoring devices.

Because capturing data for network monitoring requires all traffic to be captured, special techniques must be employed to bypass the network segmentation imposed by network switches.

A

Port mirroring is one of these techniques.

Supported by many enterprise switches, port mirroring enables the switch to copy frames that are received on one or more ports to a Switch Port Analyzer (SPAN) port that is connected to an analysis device.

The table identifies and describes terms used by the SPAN feature.

– Ingress traffic

– Egress traffic

– Source (SPAN) port

– Destination (SPAN) port

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Port mirroring is one of these techniques.

Supported by many enterprise switches, port mirroring enables the switch to copy frames that are received on one or more ports to a Switch Port Analyzer (SPAN) port that is connected to an analysis device.

The table identifies and describes terms used by the SPAN feature.

– Ingress traffic

– Egress traffic

– Source (SPAN) port

– Destination (SPAN) port

A

Ingress traffic :

Traffic that enters the switch.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Port mirroring is one of these techniques.

Supported by many enterprise switches, port mirroring enables the switch to copy frames that are received on one or more ports to a Switch Port Analyzer (SPAN) port that is connected to an analysis device.

The table identifies and describes terms used by the SPAN feature.

– Ingress traffic

– Egress traffic

– Source (SPAN) port

– Destination (SPAN) port

A

Egress traffic :

Traffic that leaves the switch.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Port mirroring is one of these techniques.

Supported by many enterprise switches, port mirroring enables the switch to copy frames that are received on one or more ports to a Switch Port Analyzer (SPAN) port that is connected to an analysis device.

The table identifies and describes terms used by the SPAN feature.

– Ingress traffic

– Egress traffic

– Source (SPAN) port

– Destination (SPAN) port

A

Source (SPAN) port :

Source ports are monitored as traffic entering them is replicated (mirrored) to the destination ports.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Port mirroring is one of these techniques.

Supported by many enterprise switches, port mirroring enables the switch to copy frames that are received on one or more ports to a Switch Port Analyzer (SPAN) port that is connected to an analysis device.

The table identifies and describes terms used by the SPAN feature.

– Ingress traffic

– Egress traffic

– Source (SPAN) port

– Destination (SPAN) port

A

Destination (SPAN) port :

A port that mirrors source ports.

Destination SPAN ports often connect to analysis devices such as a packet analyzer or an IDS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The figure shows a switch that interconnects two hosts and mirrors traffic to an intrusion detection device (IDS) and network management server.

SPAN

https://snipboard.io/35HTU4.jpg

A

The switch will forward ingress traffic on F0/1 and egress traffic on F0/2 to the destination SPAN port G0/1 that connects to an IDS. The association between source ports and a destination port is called a SPAN session.

In a single session, one or multiple ports can be monitored. On some Cisco switches, session traffic can be copied to more than one destination port. Alternatively, a source VLAN can be specified in which all ports in the source VLAN become sources of SPAN traffic.

Each SPAN session can have ports or VLANs as sources, but not both. Note: A variation of SPAN called Remote SPAN (RSPAN) enables a network administrator to use the flexibility of VLANs to monitor traffic on remote switches.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Introduction to Network Monitoring Tools Network

Security Monitoring Tools

A

Common tools that are used for network security monitoring include:

1) Network protocol analyzers such as Wireshark and

Tcpdump 2)

NetFlow 3) Security Information and Event Management Systems (SIEM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Common tools that are used for network security monitoring include:

1) Network protocol analyzers such as Wireshark and

Tcpdump 2)

NetFlow 3) Security Information and Event Management Systems (SIEM)

A

It is also common for security analysts to rely on log files and Simple Network Management Protocol (SNMP) for network behavior discovery.

Practically all systems generate log files to record and communicate their operations.

By closely monitoring log files, a security analyst can gather extremely valuable information.

SNMP allows analysts to request and receive information about the operation of network devices. It is another good tool for monitoring the behavior of a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

It is also common for security analysts to rely on log files and Simple Network Management Protocol (SNMP) for network behavior discovery.

Practically all systems generate log files to record and communicate their operations.

By closely monitoring log files, a security analyst can gather extremely valuable information.

SNMP allows analysts to request and receive information about the operation of network devices. It is another good tool for monitoring the behavior of a network.

A

Security analysts must be familiar with all of these tools.

Common Network Security Monitoring Tools

https://snipboard.io/q2r3kS.jpg

17
Q

Network Protocol Analyzers Network protocol analyzers (or “packet sniffer” applications) are programs used to capture traffic.

Protocol analyzers show what is happening on the network, often through a graphical user interface. Analysts can use these applications to see network exchanges down to the packet level.

If a computer has been infected with malware and is currently attacking other computers in the network, the analyst can see that clearly by capturing real-time network traffic and analyzing the packets.

A

Not only are network protocol analyzers used for security analysis.

They are also very useful for network troubleshooting, software and protocol development, and education.

For instance, in security forensics, a security analyst may attempt to reconstruct an incident from relevant packet captures.

18
Q

Wireshark, shown in the figure, is a very popular network protocol analyzer tool that is used in Windows, Linux, and Mac OS environments.

Wireshark is free software that can be downloaded and used by anyone.

It is a very useful tool for learning about network protocol communications.

Network protocol analyzer skills are essential for cybersecurity analysts.

https://snipboard.io/wGQ3d4.jpg

A

Frames that are captured by Wireshark are saved in a PCAP file.

PCAP files contain the frame information, interface information, packet length, time stamps, and even entire binary files that are sent across the network. Performing a long-term packet capture produces large PCAP files.

Wireshark can also open files that contain captured traffic from other software such as the tcpdump utility. Popular among UNIX-like systems such as Linux, tcpdump is a powerful utility with numerous command-line options.

The example in the command output displays a sample tcpdump capture of ping packets.

https://snipboard.io/NA9kDL.jpg

Note: windump is a Microsoft Windows variant of tcpdump. tshark is a Wireshark command line tool that is similar to tcpdump.

19
Q

NetFlow NetFlow is a Cisco IOS technology that provides 24x7 statistics on packets that flow through a Cisco router or multilayer switch.

NetFlow is the standard for collecting IP operational data in IP networks.

NetFlow is now supported on non-Cisco platforms.

IP Flow Information Export (IPFIX) is a version of NetFlow that is an IETF standard protocol.

A

NetFlow can be used for network and security monitoring, network planning, and traffic analysis. It provides a complete audit trail of basic information about every IP flow forwarded on a device.

This information includes the source and destination device IP information, the time of the communication, and the amount of data transferred.

NetFlow does not capture the actual content on the flow. NetFlow functionality is often compared to a telephone bill.

The bill identifies the destination number, the time and duration of the call. However, it does not display the content of the telephone conversation.

20
Q

NetFlow can be used for network and security monitoring, network planning, and traffic analysis. It provides a complete audit trail of basic information about every IP flow forwarded on a device.

This information includes the source and destination device IP information, the time of the communication, and the amount of data transferred. NetFlow does not capture the actual content on the flow.

NetFlow functionality is often compared to a telephone bill. The bill identifies the destination number, the time and duration of the call. However, it does not display the content of the telephone conversation.

A

Although NetFlow stores flow information in a local cache on the device, it should always be configured to forward data to a NetFlow collector which store the NetFlow data.

There are a number of third-party tools for analysis of NetFlow data.

For example, in the figure, PC1 connects to PC2 using an application such as HTTPS.

NetFlow in the Network

https://snipboard.io/GOAyZC.jpg

21
Q

NetFlow can monitor that application connection by tracking byte and packet counts for that individual application flow.

It then pushes the statistics over to an external server called a NetFlow collector.

A

For example, Cisco Stealthwatch collects NetFlow statistics to perform advanced functions including:

– Flow stitching

– Flow deduplication

– NAT stitching

22
Q

For example, Cisco Stealthwatch collects NetFlow statistics to perform advanced functions including:

– Flow stitching

– Flow deduplication

– NAT stitching

A

Flow stitching :

It groups individual entries into flows.

23
Q

For example, Cisco Stealthwatch collects NetFlow statistics to perform advanced functions including:

– Flow stitching

– Flow deduplication

– NAT stitching

A

Flow deduplication :

It filters duplicate incoming entries from multiple NetFlow clients.

24
Q

For example, Cisco Stealthwatch collects NetFlow statistics to perform advanced functions including:

– Flow stitching

– Flow deduplication

– NAT stitching

A

NAT stitching :

It simplifies flows with NAT entries.

25
Q

SIEM and SOAR Network security analysts must quickly and accurately assess the significance of any security event and answer the following critical questions:

A

Who is associated with this event?

Does the user have access to other sensitive resources?

Does this event represent a potential compliance issue?

Does the user have access to intellectual property or sensitive information?

Is the user authorized to access that resource?

26
Q

Who is associated with this event?

Does the user have access to other sensitive resources?

Does this event represent a potential compliance issue?

Does the user have access to intellectual property or sensitive information?

Is the user authorized to access that resource?

A

To help answer these questions, security analysists use:

Security Information Event Management (SIEM)

Security orchestration, automation, and response (SOAR)

27
Q

To help answer these questions, security analysists use:

Security Information Event Management (SIEM)

Security orchestration, automation, and response (SOAR)

A

SIEM :

Security Information Event Management (SIEM) is a technology used in enterprise organizations to provide real time reporting and long-term analysis of security events.

Network devices including firewall, IPSs, ESAs, WSAs, routers, switches, servers, and hosts are configured to send log events to the SIEM software.

The SIEM software correlates the millions of events using machine learning and special analytics software to identify traffic that should be investigated.

28
Q

To help answer these questions, security analysists use:

Security Information Event Management (SIEM)

Security orchestration, automation, and response (SOAR)

A

SIEM PART 2 :

SIEM systems include the following essential functions:

– Forensic analysis – The ability to search logs and event records from sources throughout the organization. It provides more complete information for forensic analysis.

– Correlation – Examines logs and events from different systems or applications, speeding detection of and reaction to security threats.

– Aggregation - Aggregation reduces the volume of event data by consolidating duplicate event records.

– Reporting - Reporting presents the correlated and aggregated event data in real-time monitoring and long-term summaries.

29
Q

To help answer these questions, security analysists use:

Security Information Event Management (SIEM)

Security orchestration, automation, and response (SOAR)

A

SIEM PART 3 :

SIEM provides details on the source of suspicious activity: User information such as username, authentication status, location.

Device information such as manufacturer, model, OS version, MAC address, network connection method, and location.

Posture information such as whether the device is compliant with the security policy, has up-to-date antivirus files, and is updated with latest OS patches.

30
Q

To help answer these questions, security analysists use:

Security Information Event Management (SIEM)

Security orchestration, automation, and response (SOAR)

A

SOAR PART 1:

Security orchestration, automation, and response (SOAR) enhances SIEM.

It helps security teams investigate security incidents and adds enhanced data gathering and a number of functionalities that aid in security incident response.

31
Q

To help answer these questions, security analysists use:

Security Information Event Management (SIEM)

Security orchestration, automation, and response (SOAR)

A

SOAR PART 2:

SOAR solutions: Provides case management tools that allow cybersecurity personnel to research and investigate incidents, frequently by integrating threat intelligence into the network security platform.

Use artificial intelligence to detect incidents and aid in incident analysis and response. Automate complex incident response procedures and investigations, which are potentially labor intensive tasks that are performed security operations center (SOC ) staff by executing run books.

These are playbooks that perform actions such as accessing and analyzing relevant data, taking steps to isolate compromised systems, and researching threats to validate alerts and execute an incident response.

Offers dashboards and reports to document incident response to improve SOC key performance indicators and can greatly enhance network security for organizations.

32
Q

To help answer these questions, security analysists use:

Security Information Event Management (SIEM)

Security orchestration, automation, and response (SOAR)

A

SOAR PART 3 :

SIEM helps sound the alarm for malicious activity. Analysts will have to act on the threat.

SOAR helps analysts respond to the threat.

33
Q

SIEM Systems Several SIEM systems exist.

SolarWinds Security Event Manager and Splunk Enterprise Security are two of the more popular proprietary SIEM systems used by SOCs.

Search the internet to learn more about these products.

A

In this course, we will use an open source product called Security Onion that includes the ELK suite for SIEM functionality.

ELK is an acronym for three products from Elastic:

– Elasticsearch

– Logstash

– Kibana

34
Q

In this course, we will use an open source product called Security Onion that includes the ELK suite for SIEM functionality.

ELK is an acronym for three products from Elastic:

– Elasticsearch

– Logstash

– Kibana

A

Elasticsearch :

Document oriented full text search engine

35
Q

In this course, we will use an open source product called Security Onion that includes the ELK suite for SIEM functionality.

ELK is an acronym for three products from Elastic:

– Elasticsearch

– Logstash

– Kibana

A

Logstash :

Pipeline processing system that connects “inputs” to “outputs” with optional “filters” in between

36
Q

In this course, we will use an open source product called Security Onion that includes the ELK suite for SIEM functionality.

ELK is an acronym for three products from Elastic:

– Elasticsearch

– Logstash

– Kibana

A

Kibana :

Browser based analytics and search dashboard for Elasticsearch