Network Security (4.1, 4.3 & 4.5) Flashcards
Network Security Fundamentals
▪ Networks are increasingly dependent on interconnecting with other
networks
▪ Risks exist not just on the untrusted Internet, but also inside our own
organization’s networks and must be minimized or eliminated
▪ Understanding the various threats facing our networks is important in
order to best defend the network against the onslaught of cyber-attacks
they are constantly facing
Network Security Goals
▪ Commonly called the CIA Triad
● Confidentiality
● Integrity
● Availability
Confidentiality
▪ Keeping the data private and safe ● Encryption ● Authentication to access resources ▪ Encryption ensures that data can only be read (decoded) by the intended recipient ● Symmetric encryption ● Asymmetric encryption
Symmetric Encryption (Confidentiality)
▪ Both sender and receiver use the same key
▪ DES (Data Encryption Standard)
● Developed in the mid-1970s
● 56-bit key
● Used by SNMPv3
● Considered weak today
▪ 3DES (Triple DES)
● Uses three 56-bit keys (168-bit total)
● Encrypt, decrypt, encrypt
▪ AES (Advanced Encryption Standard)
● Preferred symmetric encryption standard
● Used by WPA2
● Available in 128-bit, 192-bit, and 256-bit keys
▪ Sender and receiver use the same key to encrypt and decrypt the
messages
Asymmetric Encryption (Confidentiality)
▪ Uses different keys for sender and receiver
▪ RSA is the most popular implementation
▪ RSA algorithm is commonly used with a public key infrastructure (PKI)
▪ PKI is used to encrypt data between your web browser and a shopping
website
▪ Can be used to securely exchange emails
▪ Sender and receiver use different keys to encrypt and decrypt the
messages
Confidentiality with HTTPS
▪ Uses asymmetrically encrypted messages to transfer a symmetric key
Integrity
▪ Ensures data has not been modified in transit
▪ Verifies the source that traffic originates from
▪ Integrity violations
● Defacing a corporate web page
● Altering an e-commerce transaction
● Modifying electronically stored financial records
Hashing (Integrity)
▪ Sender runs string of data through algorithm
● Result is a hash or hash digest
▪ Data and its hash are sent to receiver
▪ Receiver runs data received through the same algorithm and obtains a
hash
▪ Two hashes are compared
● If the same, the data was not modified
Hashing Algorithms (Integrity
▪ Message digest 5 (MD5) ● 128-bit hash digest ▪ Secure Hash Algorithm 1 (SHA-1) ● 160-bit hash digest ▪ Secure Hash Algorithm 256 (SHA-256) ● 256-bit hash digest ▪ Challenge-Response Authentication Mechanism Message Digest 5 (CRAMMD5) ● Common variant often used in e-mail systems
Availability
vailability
▪ Measures accessibility of the data
▪ Increased by designing redundant networks
▪ Compromised by
● Crashing a router or switch by sending improperly formatted data
● Flooding a network with so much traffic that legitimate requests
cannot be processed
o Denial of Service (DoS)
o Distributed Denial of Service
Threat
o Threat ▪ A person or event that has the potential for impacting a valuable resource in a negative manner o Vulnerability ▪ A quality or characteristic within a given resource or its environment that might allow the threat to be realized ● Internal Threat o Any threat that originates within the organization itself ● External Threat o Any threat that could be people, like a hacker, or it can be an event or environmental condition
Threat
o Threat ▪ A person or event that has the potential for impacting a valuable resource in a negative manner o Vulnerability ▪ A quality or characteristic within a given resource or its environment that might allow the threat to be realized ● Internal Threat o Any threat that originates within the organization itself ● External Threat o Any threat that could be people, like a hacker, or it can be an event or environmental condition
Environmental Vulnerabilities
▪ Undesirable conditions or weaknesses that are in the general area
surrounding the building where a network is run
Physical Vulnerabilities
▪ Undesirable conditions or weaknesses in the building where the network
is located
Operational Vulnerabilities
▪ Focuses on how the network and its systems are run from the
perspective of an organization’s policies and procedures
Technical Vulnerabilities
▪ System-specific conditions that create security weaknesses
● Common Vulnerabilities and Exposures (CVE)
o A list of publicly disclosed computer security weaknesses
● Zero-Day Vulnerability
o Any weakness in the system design, implementation,
software code, or a lack of preventive mechanisms in place
▪ CVEs (Known vulnerabilities)
▪ Zero-Day (Brand new vulnerability)
Exploit
▪ Piece of software code that takes advantage of a security flaw or
vulnerability within a system or network
▪ Keep systems properly patched and antimalware software updated
Risk Management
o The identification, evaluation, and prioritization of risks to minimize, monitor,
and control the vulnerability exploited by a threat
Risk Assessment
▪ A process that identifies potential hazards and analyzes what could
happen if a hazard occurs
● Security
● Business
Security Risk Assessment
▪ Used to identify, assess, and implement key security controls within an
application, system, or network
Threat Assessment
▪ Focused on the identification of the different threats that may wish to
attack or cause harm to your systems or network
Vulnerability Assessment
▪ Focused on identifying, quantifying, and prioritizing the risks and
vulnerabilities in a system or network
● Nessus
● QualysGuard
● OpenVAS
o Threat controlled by the attacker of event
o Vulnerability within your control
Penetration Test
▪ Evaluates the security of an IT infrastructure by safely trying to exploit
vulnerabilities within the systems or network
Posture Assessment
▪ Assesses cyber risk posture and exposure to threats caused by
misconfigurations and patching delays
● Define mission-critical components
● Identify strengths, weaknesses, and security issues
● Stay in control
● Strengthen position
Business Risk Assessment
▪ Used to identify, understand, and evaluate potential hazards in the
workplace
Process Assessment
▪ The disciplined examination of the processes used by the organization
against a set of criteria
● Determines if you are doing things right, and if you are doing the
right things
● Vendor Assessment
● The assessment of a prospective vendor to determine if they can
effectively meet the obligations and the needs of the business
Least Privilege
▪ Using the lowest level of permissions or privileges needed in order to
complete a job function or admin task
Least Privilege
▪ Using the lowest level of permissions or privileges needed in order to
complete a job function or admin task
Role-based Access
▪ Discretionary Access Control (DAC)
● An access control method where access is determined by the
owner of the resource
o Every object in a system has to have an owner
o Each owner must determine the access rights and
permissions for each object
▪ Mandatory Access Control (MAC)
● An access control policy where the computer system gets to
decide who gets access to what objects
o Unclassified
o Confidential
o Secret
o Top secret
Role-Based Access Control (RBAC)
▪ An access model that is controlled by the system but focuses on a set of
permissions versus an individual’s permissions
▪ Creating groups makes it easy to control permissions based around actual
job functions
Zero-Trust
▪ A security framework that requires users to be authenticated and
authorized before being granted access to applications and data
1. Reexamine all default access controls
2. Employ a variety of prevention techniques and defense in depth
3. Enable real-time monitoring and
controls to identify and stop
malicious activity quickly
4. Ensure the network’s zero-trust
architecture aligns to a broader
security strategy
Defense in Depth
o Cybersecurity approach in which a series of
defensive mechanisms are layered in order to protect valuable data and
information
▪ Physical
▪ Logic
▪ Administrative