Security/Network Basics (Ch. 1,2) Flashcards
CIA triad
_ confidentiality
_ integrity
_ availability
User identification
_ Claiming an identity prior to authentication
Integrity
_ Ensures data has not changed.
_ Can uses hashes to verify integrity
Redundancy
_ Provides fault tolerance
SPOF
_ Single point of failure
_ If it fails, the entire system “can” fail
Scalability vs. elasticity
Scalability:
_ long-term strategy for being able to scale
_ done manually
Elasticity:
_ ability to dynamically scale up or out as needed
_ scales back down when not needed
TCO
_ total cost of ownership
resiliency
_ ability to self-heal or recover from faults with minimal downtime
_ e.g. performing and testing backups
_ e.g. UPS or generators
_ e.g. NIC teaming
_ e.g. redundant disk subsystems
_ e.g. retrying failed processes
Space needed for encryption
_ typically about a 40% increase
risk
_ the possibility or likelihood of a threat exploiting a vulnerability and resulting in a loss
threat
_ a circumstance or event that has the potential to compromise confidentiality, integrity, or availability
_ can be natural or man-made
_ can be intentional or accidental
Risk mitigation
_ reducing the chances that a threat will exploit a vulnerability
Categories of security controls
_ managerial controls
_ operational controls
_ technical controls
_ (classification alternative to “control types”)
Managerial controls
_ administrative controls
_ document policy
_ regular reviews, such as risk assessments and vulnerability assessments
Operational controls
_ ensure day-to-day ops comply with security plan
_ primarily implemented by people rather than systems
_ e.g. awareness and training
_ e.g. configuration management (such as secure baselines and change management)
_ e.g. media protection
_ e.g. physical and environmental protection
Technical controls
_ technological controls, whether software or hardware
Control types
_ preventative
_ detective
_ corrective
_ deterrent
_ compensating
_ physical
_ (classification alternative to “control categories”)
Preventative controls
_ hardening (making more secure than default config, using defense-in-depth)
_ training
_ security guards
_ change management (a change process helps catch configuration problems before they occur)
_ account disablement policy
_ intrusion prevention system (IPS)
_ and others (not listed)
SEM
_ security event management
_ real-time monitoring and analysis of security events
SIM
_ security information management
_ long-term storage of security data
_ used for analyzing trends and creating reports
SIEM
_ security information and event management system
_ collects, analyzes, manages data from multiple sources
_ detects trends
_ raises alerts
_ combines SEM and SIM functions
IDS
_ intrusion detection system
_ monitors network and sends alerts
_ out-of-band with traffic (can’t block traffic)
_ may modify ACLs, terminate processes, or redirect traffic in response to detections
Detective controls
_ post-exploit
_ log monitoring
_ SIEM systems
_ security audit of organization
_ video surveillance
_ motion dection
_ intrusion detection system (IDS)
_ and others (not listed)
Corrective and recovery controls
_ backups and system recovery
_ incident handling process
Deterrent controls
_ discourage hackers from attacking or employees from violating security policies
_ often also preventative
_ e.g. cable locks (for laptops)
_ e.g. physical locks
TOTP
_ time-based one-time password
_ example of a compensating control
Compensating controls
_ controls that are alternatives to the primary control
_ usually for handling special situations
_ e.g. TOTP access until user receives a security card
Response controls
_ aka incident response controls
_ prepare for security incidents
_ respond to security incidents
Network discovery
_ devices on a network discovering other devices on the same network
Network reconnaissance
_ acquiring details about a network and its devices
ICMP
_ Internet Control Message Protocol
_ often used in DoS attacks
_ used by ping
ping (e.g count)
_ sends an ICMP echo request packet
_ can limit counts on Linux with “-c count”
_ can loop pings on Windows with “-t”
_ firewall may block
hping
_ only on Linux
_ sends pings to TCP, UDP, and ICMP
NIC
_ network interface card
_ wired or wireless
ifconfig
Often first step in troubleshooting network problems. Can show:
_ IP address
_ subnet mask
_ default gateway
_ MAC address
_ DNS address
_ config info for NICs
_ deprecated but still useful
_ ipconfig on Windows
Use ifconfig to get basic network info
_ ifconfig
Use ifconfig to show TCP/IP config for each NIC
_ ifconfig -a
Show local DNS cache
_ displaydns
Flush the local DNS cache
_ flushdns
Ip command
_ recommended over ifconfig, but not as functional
_ show details on interfaces: ip link show
_ enable a network interface: ip link set eth0 up
_ show stats on network interface: ip -s link
netstat
_ shows TPC/IP stats
_ shows active TCP/IP connections
_ switches can be combined