Common Security Threats - Paiet/Tech-Journal-for-Everything GitHub Wiki
-
Identify Common Security Threats
- 1.2.a Identify common network attacks
- Financial
- Disruption
- Geopolitical
- Distributed Denial of Service Attacks
- Direct
- Reflected
- Amplification
- 1.2.b Describe social engineering
- Attacks that rely on human vulnerability
- manipulating people to violate physical security
- manipulating people to give up passwords
- manipulating people to do more than they should.
- Common Social Engineering Tactics:
- Phishing: Email messsage that elicits users to provide sensitive information.
- Maladvertising: using malicious ads on websites to redirect user's browsers to malware hosting site.
- Phone Scams: "You just won..." "Do you mind helping me with some information"
- Social Engineering Counteractions
- Ongoing Training about latest security threats
- Ongoing Training about the risks of the threats and how to prevent them.
- Ongoing Training about their role in security.
- Official Policy about security operations and decisions.
- Password Management
- Two-factor Authentication
- Antivirus/Antiphishing software
- Change Management
- Information Classification
- Document Handling and Disposal
- Physical Security
- Attacks that rely on human vulnerability
- 1.2.c Identify malware
- Packet Capture Tools
- Shows raw packets
- Generates lots of data
- SNORT
- Most popular IDS/IPS software
- NetFlow
- considers the entire data flow
- based on a set of predefined parameters such as
- source IP address
- source port
- destination IP address
- destination port
- IP protocol
- ingress interface
- type of service (ToS)
- each parameter will create a new flow
- See Configuration Example Below
- IPS Events
- Alarms triggered on IPS may alert to presence of malware
- Cisco AMP (Advanced Malware Protection)
- designed for Cisco Firepower appliances.
- continuous monitoring and analyzing of traffic after traffic enters network
- Can be centrally managed through Cisco FireSight (FMC)
- NGIPS (Next Generation Intrusion Prevention Systems)
- Firewall and Sourcefire IPS
- Focus not on app control but not on threats.
- multi layer threat protection at high throughput.
- Centrally managed through Cisco FireSight
- Packet Capture Tools
- 1.2.d Classify the vectors of data loss/exfiltration
- The majority of our network security focus has always been on preventing bad guys from getting into the network.
- Many security measures good at identifying traffic entering into the network.
- Not so many security measures good at identifying traffic leaving the network.
- Targeted Assets
- Intellectual Property: data or documentation that is considered property of the organization and created by employees of the organization.
- Personally Identifiable Information (PII): Names, Social Security Numbers (SSN),addresses.
- Credit/Debit Cards
- 1.2.a Identify common network attacks
-
Netflow Configuration Example R2#config t R2(config)#interface fa1/0 R2(config-if)#ip route-cache flow R2(config-if)#exit R2(config)#ip flow-export 192.168.100.200 0 R2(config)#exit R2# clear ip flow stats
! On R1 do extended ping to 192.168.100.1 change datagram size source from 209.251.159.177