Classs 10 Lab 3 ‐ High‐Level Analysis - Justin-Boyd/CIT-Class GitHub Wiki

Task

  • Explain how secure network architecture can help mitigate or even prevent the following attacks:

DDoS

Answer
Place a firewall at every junction of the network, not just at the perimeter. This way, if one firewall fails due to overload, another will take its place. This solution can be costly, but there is a built-in firewall in switches and routers that can provide similar functionality.

Hardware or cloud-based anti-DDoS devices at the perimeter can also be helpful against this type of attack.

Network traffic monitoring tools can provide high visibility of the network to detect an attack early in its cycle. In addition, the SOC team should have clear written protocols to handle a DDoS attack.

Phishing

Answer
Awareness training: The best way to prevent a phishing attack is to educate employees about cybersecurity risks so they can distinguish phishing emails from legitimate emails.

However, even the most aware and capable cybersecurity specialist can make a mistake and fall victim to a phishing email.

Due to possible human error, a mail relay server with the following functions and others must be placed in the demilitarized zone or in the cloud to cover the gap. The server should handle the following tasks:

Perform antivirus scans
Perform spam list scans
Pass only file extensions included in the allow list
Deconstruct files
Pass data through a sandbox
Others

Malware

Answer
Workstations should have some form of endpoint protection, preferably Endpoint Detection and Response (EDR), which includes antimalware, among other functions.

Internet access should be regulated through a proxy server to ensure that outbound connections are performed by humans, rather than bots or viruses reporting to command centers.

Strict user permissions on each workstation should also be enforced. Do not provide local admin permissions to users unless they really need them.

Insider Threats

Answer
DLP should be in place on every workstation to combat intentional and unintentional data leaks.

Job Rotations can also help prevent insider threats because of changing roles makes it harder for one person to take down an area that they are working in.

Mandatory vacations to audit a persons activities

MITM

Answer
Encrypt communications using strong encryption ciphers.

Use multifactor authentication wherever possible.

Provide awareness training regarding the importance of strong passwords and the risks of open Wi-Fi networks.

Worms

Answer
As opposed to malware, which requires user interaction, a worm does not require such interaction and can self-propagate. As soon as a worm reaches a workstation, it can replicate and spread quickly without user intervention by exploiting unpatched vulnerabilities. Therefore, awareness training for safe internet usage is important, as well as keeping all systems and software patched and up to date.

Another important measure against worms is an endpoint security suite. Many worms transfer themselves through infected flash drives, a technique that can be prevented via device control on workstations, which will prevent users from inserting flash drives in the computer.

Brute-force

Answer
Brute-force exploits the fact that we tend to give some meaning to passwords to make them easier to remember. Common passwords include an important date, the name of a loved one, a favorite movie, etc. An easy way to manage passwords is via a password management tool that stores them in a secure location and generates strong random passwords.

Password policies must be enforced across an organization, including lockout policies, 2FA, strong password requirements, and CAPTCHA to thwart bots.
⚠️ **GitHub.com Fallback** ⚠️