*** Most important. Based on blueprint Flashcards
CAPWAP
Encapsulates data between LWAP and WLC. Routable. Wireless IPS. Much more
ARP
Operates between L2 and L3.
ARP Ethertype
0x0806
DNS Resolver
local client
DNS Recursor
Internal DNS
Bridges vs. Switches
Bridges use SW bridging logic. Switches use HW bridging logic.
Cisco AMP
Advanced Malware Protection. Applies before, during, and after attack continuum. Examines SHA hash. Cloud tests files. Machine learning. Trajectory. Intel feeds.
Cisco WSA
Web Security Appliance. URL Filtering. Websense type features.
Cisco CWS
Cloud Web Security. Basically, Websense in the cloud. Request goes from ASA to CWS where decision is made.
Cisco ESA
Email Security Appliance. Incoming reputation filter, outgoing DLP
Cisco CES
ESA in the cloud
Cisco Firepower
NGFW with VPN, IPS, AMP, DNS inspection, application visibility and control, reputation-based filtering, URL filtering, SSL decryption, and so on
Netflow
Collects/monitors network traffic flow data.
Audit trail.
Unidirectional series of packets bet. source and destination.
What does Netflow data contain?
Metadata 5 Tuple Interfaces Duration of comms Transmission rate Amount of data
Netflow vs. IPS
Netflow looks at headers. IPS does deep packet analysis.
Netflow is information about comms. IPS can drop packets.
Runbook automation
Automated reactions. Can minimize time bet. discovery and remediation.
Runbook parts
Tools, Workflows, Processes
Sliding Window
Relates to anomaly detection. Needs to be long enough to define normal traffic.
Non-discretionary access control
Role Based AC. Job function related.
Network vs. Host AV
Network AV takes action on files that are traversing the network.
Host AV is run by endpoints.
Agent vs. Agentless
Netflow is agentless
SIEM Capabilities
Monitoring IR Anomaly Detection Real time rule based alerts Correlation Logging and reporting Reports
New Syslog name
rsyslog (old was syslogd)
Syslog config file location
/etc/syslog.conf
27002:2013
provides guidelines for organizational information, security standards, and information security management practices,
Vulnerability management
identifying, classifying, remediating, and mitigating vulnerabilities in software, firmware, and hardware.
Configuration management
process for establishing and maintaining consistency of a product’s performance, functional requirements, and design throughout the product’s life cycle.
Digital signature creation
Hash the document
Encrypt the hash with private key of signer
Encrypted hash is appended to document
Digital signature verification
Recipient check public key of the signer
Recipient decrypts the signature using he public key leaving the hash
Recipient rehashes the document. Hash match means it’s authentic.
CSR contains
System name, organization, location, enrolling systems public key info.
TACACS+ Hashing algorithm
MD5
MD5 vs. SHA-1
128 bit vs. 160 bit digest.
NIST recommends avoiding both
ECDHE_ECDSA
Authentication and Key Exchange