Podcast
Questions and Answers
Which of the following BEST describes a 'threat' in the context of network security?
Which of the following BEST describes a 'threat' in the context of network security?
- A weakness in a system that can be exploited.
- The measure of uncertainty regarding a future event.
- The method of reducing the likelihood of a successful attack.
- A potential danger that can exploit a vulnerability. (correct)
What is the primary goal of network security?
What is the primary goal of network security?
- To ensure complete, unrestricted access to all network resources.
- To implement the latest security technologies, regardless of need.
- To protect the confidentiality, integrity, and availability of network resources and data. (correct)
- To maximize network bandwidth and minimize latency.
Which of the following is an example of an internal threat vector for data loss?
Which of the following is an example of an internal threat vector for data loss?
- Unencrypted Devices
- Email/Webmail
- Improper Access Control (correct)
- Removable Media
In the context of network security, what does 'mitigation' refer to?
In the context of network security, what does 'mitigation' refer to?
Which network type is commonly found in homes and small businesses?
Which network type is commonly found in homes and small businesses?
Which of the following roles is primarily responsible for overseeing an organization's information security?
Which of the following roles is primarily responsible for overseeing an organization's information security?
What is the main characteristic that distinguishes a worm from a virus?
What is the main characteristic that distinguishes a worm from a virus?
What is the primary purpose of a Trojan horse?
What is the primary purpose of a Trojan horse?
Which of the following BEST describes a 'zero-day' vulnerability?
Which of the following BEST describes a 'zero-day' vulnerability?
Which of the following attack types involves an attacker intercepting communications between two parties without their knowledge?
Which of the following attack types involves an attacker intercepting communications between two parties without their knowledge?
What is the primary purpose of 'penetration testing'?
What is the primary purpose of 'penetration testing'?
Which of the following is a common method for mitigating a Denial-of-Service (DoS) attack?
Which of the following is a common method for mitigating a Denial-of-Service (DoS) attack?
Which security principle uses hashing algorithms to ensure data has not been altered during transmission or storage?
Which security principle uses hashing algorithms to ensure data has not been altered during transmission or storage?
What is the purpose of 'data loss prevention' technology?
What is the purpose of 'data loss prevention' technology?
In the context of network security, what is the 'principle of least privilege'?
In the context of network security, what is the 'principle of least privilege'?
Which of the following is a key element of physical security for a data center?
Which of the following is a key element of physical security for a data center?
Which security measure can be used to segment a network and control traffic flow between different segments?
Which security measure can be used to segment a network and control traffic flow between different segments?
What is the purpose of Control Plane Policing (CoPP)?
What is the purpose of Control Plane Policing (CoPP)?
An attacker spoofs the MAC address of a legitimate device on the network, redirecting traffic intended for that device to the attacker's machine. Which type of attack refers to this scenario?
An attacker spoofs the MAC address of a legitimate device on the network, redirecting traffic intended for that device to the attacker's machine. Which type of attack refers to this scenario?
Which of the modern hacking titles below would most likely perform security tasks on a network without malicious intent, but may occasionally cross ethical lines for personal gain or curiosity?
Which of the modern hacking titles below would most likely perform security tasks on a network without malicious intent, but may occasionally cross ethical lines for personal gain or curiosity?
Threat, vulnerability, mitigation, and risk are all important elements of network security.
Threat, vulnerability, mitigation, and risk are all important elements of network security.
Internal and external threats are insignificant in modern network attacks.
Internal and external threats are insignificant in modern network attacks.
Hard copy documents are not considered as vectors of data loss.
Hard copy documents are not considered as vectors of data loss.
Campus Area Networks (CANs) typically do not include components like AAA Servers and ASA Firewalls.
Campus Area Networks (CANs) typically do not include components like AAA Servers and ASA Firewalls.
Wide Area Networks (WANs) do not commonly use VPNs.
Wide Area Networks (WANs) do not commonly use VPNs.
Outside perimeter security for data centers includes electronic motion detectors.
Outside perimeter security for data centers includes electronic motion detectors.
Describing the evolution of network security is not crucial when discussing network threats.
Describing the evolution of network security is not crucial when discussing network threats.
Hacking operating systems is not considered a penetration testing tool.
Hacking operating systems is not considered a penetration testing tool.
Eavesdropping is not a network hacking attack.
Eavesdropping is not a network hacking attack.
A trojan is a self-replicating type of malware.
A trojan is a self-replicating type of malware.
The primary function of a worm is disrupting hardware performance.
The primary function of a worm is disrupting hardware performance.
Initial query of a target is a type of reconnaissance attack
Initial query of a target is a type of reconnaissance attack
DHCP spoofing is not a type of access attack.
DHCP spoofing is not a type of access attack.
Social engineering attacks do not involve psychological manipulation.
Social engineering attacks do not involve psychological manipulation.
A botnet is a type of hardware firewall used in DDoS mitigation.
A botnet is a type of hardware firewall used in DDoS mitigation.
Network hardening contributes to data availability.
Network hardening contributes to data availability.
Human resources security is not considered a network security domain
Human resources security is not considered a network security domain
Network Security Policies are rigid documents that never require updating once implemented.
Network Security Policies are rigid documents that never require updating once implemented.
Implementing a non-switched infrastructure is an effective technique for mitigating reconnaissance attacks.
Implementing a non-switched infrastructure is an effective technique for mitigating reconnaissance attacks.
The Cisco Network Foundation Protection Framework (NFP) primarily addresses the ethical considerations of network administrators, rather than the technical aspects of security.
The Cisco Network Foundation Protection Framework (NFP) primarily addresses the ethical considerations of network administrators, rather than the technical aspects of security.
Flashcards
What is a Virus?
What is a Virus?
A malicious software which executes a specific unwanted, often harmful function on a computer.
What is a Worm?
What is a Worm?
Executes arbitrary code and installs copies of itself in the memory of the infected computer, automatically replicating and spreading across the network.
What is a Trojan horse?
What is a Trojan horse?
A non-self-replicating type of malware, often containing malicious code, designed to look like something else, such as a legitimate application or file
What is a Black Hat Hacker?
What is a Black Hat Hacker?
Signup and view all the flashcards
What is a White Hat Hacker?
What is a White Hat Hacker?
Signup and view all the flashcards
What is a Hacker?
What is a Hacker?
Signup and view all the flashcards
What is Social Engineering?
What is Social Engineering?
Signup and view all the flashcards
What is Phishing?
What is Phishing?
Signup and view all the flashcards
What is a SYN Flood?
What is a SYN Flood?
Signup and view all the flashcards
What is a Smurf Attack?
What is a Smurf Attack?
Signup and view all the flashcards
What is a Botnet?
What is a Botnet?
Signup and view all the flashcards
What are network security drivers?
What are network security drivers?
Signup and view all the flashcards
What is a vulnerability?
What is a vulnerability?
Signup and view all the flashcards
What is Mitigation?
What is Mitigation?
Signup and view all the flashcards
What is Risk?
What is Risk?
Signup and view all the flashcards
What are different network topologies?
What are different network topologies?
Signup and view all the flashcards
What are Network Security Job Titles?
What are Network Security Job Titles?
Signup and view all the flashcards
What are Network Security Domains?
What are Network Security Domains?
Signup and view all the flashcards
How can we Defend the Network?
How can we Defend the Network?
Signup and view all the flashcards
What is included in Mitigating Malware?
What is included in Mitigating Malware?
Signup and view all the flashcards
Who are Cyber Criminals?
Who are Cyber Criminals?
Signup and view all the flashcards
Who are Hacktivists?
Who are Hacktivists?
Signup and view all the flashcards
Who are Script Kiddies?
Who are Script Kiddies?
Signup and view all the flashcards
Who are State-Sponsored Hackers?
Who are State-Sponsored Hackers?
Signup and view all the flashcards
Who are Vulnerability Brokers?
Who are Vulnerability Brokers?
Signup and view all the flashcards
What is a Password Cracker?
What is a Password Cracker?
Signup and view all the flashcards
What is Network Scanning?
What is Network Scanning?
Signup and view all the flashcards
What is Packet Crafting?
What is Packet Crafting?
Signup and view all the flashcards
What is a Packet Sniffer?
What is a Packet Sniffer?
Signup and view all the flashcards
What are Rootkit Detectors?
What are Rootkit Detectors?
Signup and view all the flashcards
What are Fuzzers?
What are Fuzzers?
Signup and view all the flashcards
What is Eavesdropping?
What is Eavesdropping?
Signup and view all the flashcards
What is Data modification?
What is Data modification?
Signup and view all the flashcards
What is IP address spoofing?
What is IP address spoofing?
Signup and view all the flashcards
What is Man-in-the-middle attack?
What is Man-in-the-middle attack?
Signup and view all the flashcards
What is Spyware?
What is Spyware?
Signup and view all the flashcards
What is Ransomware?
What is Ransomware?
Signup and view all the flashcards
What is Scareware?
What is Scareware?
Signup and view all the flashcards
What are Rootkits?
What are Rootkits?
Signup and view all the flashcards
What is Principle of Minimum Trust?
What is Principle of Minimum Trust?
Signup and view all the flashcards
Study Notes
Securing Networks
- Completion of this section enables describing present network security and explains how all network types require protection.
Current State of Affairs
- Networks face constant attacks from various origins like China, the United States, and Turkey.
- Common attack targets include the United States, Philippines, and South Korea.
- Attack types vary, affecting services, ports, and systems.
Drivers for Network Security
- Common network security terms include threat, vulnerability, mitigation, and risk.
Vectors of Network Attacks
- Network attacks can originate externally through the internet, targeting systems directly
- Attacks can originate internally from compromised hosts, infiltrating the internal network.
Data Loss
- Data loss vectors include email/webmail, unencrypted devices, cloud storage, removable media, hard copies, and improper access control.
Network Topology Overview
- Network topologies include:
- Campus Area Networks with elements like AAA servers, ASA firewalls, VPNs, and DHCP servers.
- Small Office/Home Office (SOHO) Networks with wireless routers and layer 2 switches.
- Wide Area Networks (WANs) connecting branch sites, regional sites, and mobile workers.
- Data Center Networks employing on-premise security officers, fences, video surveillance, and biometric sensors for security.
Network Threats
- Section completion allows description of network security evolution
- Section completion allows description of attack tools variety used by hackers
- Section completion allows description of malware
- And explanation of typical network attacks
Who is Hacking Our Networks?
- Modern hacking titles include:
- Script Kiddies.
- Vulnerability Brokers.
- Hacktivists.
- Cyber Criminals.
- State-Sponsored Hackers.
Hacker Tools
- Penetration testing tools include:
- Password crackers and wireless hacking tools
- Network scanning and hacking tools plus packet crafting tools.
- Packet sniffers and Rootkit detectors.
- Fuzzers to find vulnerabilities.
- Security tools include:
- Forensic tools and debuggers.
- Hacking operating systems and encryption programs.
- Vulnerability exploitation and vulnerability scanners.
Categories of Attack Tools
- Network hacking attacks:
- Eavesdropping and data modification
- IP address spoofing and denial-of-service.
- Man-in-the-middle and compromised-key attacks.
- Sniffers
Malware
- Types of malware:
- Viruses execute unwanted and potentially harmful functions on a device.
- Worms replicate and spread across networks automatically.
- Trojan horses disguise themselves as legitimate files or applications to perform malicious acts.
- Trojan horse classifications:
- Security software disablers and Remote-access tools
- Data-sending and destructive tools
- Proxy, FTP, and DoS tools
- Worm components:
- Enabling vulnerability, Propagation mechanism, and payload
- Worm propagation happens in cycles including propagating for 19 days, launching an attack for 7 days then going dormant, before repeating
Other Malware
- Other forms of Malware include:
- Ransomware, Scareware
- Spyware, Phishing
- Adware, Rootkits
Types of Network Attacks
- Attacks include:
- Reconnaissance, used to gather info
- Access, used to gain access
- DoS, denial of service
- Data modification, used to manipulate data
- Syn Flood, a type of DoS attack
- Smurf attack, type of DoS
Reconnaissance Attacks
- Actions include:
- Initial query of target and ping sweep of target network
- Port scans of active IP addresses, vulnerability scanners, and use of exploitation tools
Access Attacks
- Access attacks are used:
- To retrieve data and gain access
- To escalate access privileges
- Types of access attacks:
- Password attacks and port redirection
- Man-in-the-middle attacks and buffer overflows.
- IP, MAC, and DHCP spoofing.
Social Engineering Attacks
- Common attacks include:
- Pretexting and phishing.
- Spearphishing and spamming
- Tailgating and quid pro quo tactics ("something for something").
Denial of Service Attacks
- This disrupts access to services
DDoS Attacks
- A hacker builds a network of infected machines called a botnet, where compromised computers are zombies controlled by handler systems.
- Zombie computers continue to scan and infect more targets.
- The hacker instructs the handler system to make the botnet of zombies carry out the DDoS attack.
Mitigating Threats
- Completion of this section means the ability:
- To describe defending methods and resources to protect network.
- To know the domains collection for network security.
- To explain Cisco SecureX Architecture purpose.
- To describe techniques used to mitigate common network attacks.
- To explain securing the three functional areas of Cisco routers and switches.
Defending the Network
- Best practices include:
- Developing a written security policy.
- Educating employees about social engineering risks to validate identities.
- Controlling physical access to systems.
- Using strong passwords, encrypting sensitive data, and implementing security hardware/software.
- Performing regular backups, shutting down unnecessary services, and keeping patches up-to-date to prevent privilege escalation.
- Performing security audits to assess network.
Network Security Professionals
- Personnel roles:
- CIO and CISO
- Security Operations Manager and Chief Security Officer
- Security Manager and Network Security Engineer
Network Security Organizations
- Common organzations include:
- CERT and SANS
- MITRE and FIRST
- (ISC)2 and MS-ISAC
CIA Triad
- Confidentiality uses encryption to protect data, Integrity uses hashing ensures data is pristine during use, Availability assures accessibility through network hardening and backups.
Network Security Domains
- Include:
- Risk assessment.
- Security policy and organization of information security, asset management, and human resources security.
- Physical and environmental security and communications/operations management.
- Information systems acquisition, development, and maintenance, access control and information security incident management.
- Compliance and business continuity management.
Mitigating Malware
- Mitigating software to employ:
- Antivirus, antispyware and internet security
- Firewall, antispam and antiphishing
Mitigating Worms
- Employ inoculation and quarantines
Mitigating Reconnaissance Attacks
- Implementing authentication to ensure proper access.
- Using encryption to render packet sniffer attacks useless.
- Employ antisniffer tools and a switched infrastructure
- A firewall and IPS should be employed
Mitigating Access Attacks
- Strong password security
- Principle of minimum trust
- Cryptography and applying OS and APP patches protects from access attacks
Mitigating DoS Attacks
- IPS and firewalls (Cisco ASAs and ISRs)
- Antispoofing technologies and Quality of Service-traffic policing
NFP Framework
- Framework including :
- Control Plane with a Routing Protocol and IP Routing Table.
- Management Plane with Management Processes.
- Data Plane with an IP Forwarding Table.
- Elements connect using Exchange of Routing Information, Management Sessions, Incoming and Outgoing packets
Securing the Control Plane
- Employ:
- AutoSecure actions and routing protocol authentication
- Control Plane Policing (CoPP)
Securing the Management Plane
- Employ:
-Enabling login and password policy.
- Presenting legal notification.
- Ensuring the confidentiality of data using SSH and HTTPS.
- Enabling role-based access control, authorizing actions and enabling management access reporting.
Securing the Data Plane
- Employ:
- ACLs and antispoofing actions
- Layer 2 security including port security, DHCP snooping, dynamic ARP inspection (DAI).
Summary
- Chapter aims to explain network security
- Chapter aims to describe threats and attacks types
- Chapter aims to explain tools/procedures to mitigate the effects of malware and network attacks
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.