Ccna Security Ch1 Networking Security Concepts
Ccna Security Ch1 Networking Security Concepts
Ccna Security Ch1 Networking Security Concepts
I. Foundation Topics
II. Understanding Network and Information Security Basics
1. The lack of security has financial implications must have security
An asset is an item that is to be protected and can include property, people, and
information/data that have value to the company. This includes intangible items
such as proprietary information or trade secrets and the reputation of the
company. The data could include company records, client information,
proprietary software, and so on.
Vulnerability
Threat
This is what you are protecting against. A threat is anything that attempts to gain
unauthorized access to, compromise, destroy, or damage an asset. Threats are
often realized via an attack or exploit that takes advantage of an existing
vulnerability. Threats today come in many varsities and spread more rapidly
than ever before. Threats can also morph and be modified over time, and so you
must be ever diligent to keep up with them.
Risk
Countermeasure
6. Classifying Assets
1. Classifying assets is important in order to be able to apply the appropriate security and
treatment of that asset. For example, you would classify a type of data traveling over a
VPN as top secret and therefore encrypt that data as opposed to unclassified insecure
data.
Table 1-3 Asset Classifications
Governmental classifications
1.
2.
3.
4.
5.
Top Secret
Secret
Confidential
Sensitive but unclassified (SBU)
Unclassified
1.
2.
3.
4.
Confidential
Private
Sensitive
Public
Classification criteria
1.
2.
3.
4.
Useful lifetime
Replacement cost
Age
Value
Classification roles
7. Classifying Vulnerabilities
1. One must discover and classify vulnerabilities in order to put in place policy and
technology to mitigate them
a. Policy flaws
b. Design errors
c. Protocol weaknesses
d. Misconfiguration
e. Software vulnerabilities
f. Human factors
g. Malicious software
h. Hardware vulnerabilities
i. Physical access to network resources
2. Databases that categorize threats in the public domain
a. Common Vulnerabilities and Exposures (CVE)
b. National Vulnerability Database (NVD)
8. Classifying Countermeasures
1. Common control methods used to implement countermeasures include the following
a. Administrative These consist of written policies, procedures, guidelines, and
standards. An example would be a written acceptable use policy (AUP), agreed to
by each user on the network. Another example is a change control process that
needs to be followed when making changes to the network. Administrative
controls could involve items such as background checks for users, as well.
b.
Physical Physical controls are exactly what they sound like, physical security for
the network servers, equipment, and infrastructure. An example is providing a
locked door between users and the wiring closet on any floor (where the switches
and other gear exists). Another example of a physical control is a redundant system
(for instance, an uninterruptible power supply).
c. Logical Logical controls include passwords, firewalls, intrusion prevention
systems, access lists, VPN tunnels, and so on. Logical controls are often referred to
as technical controls.
2. Now all controls are created equal, but when they all work together you can put in
place a successful strategy that prevents, detects, corrects, and recovers all while acting
as a deterrent to a threat.
1.
2.
3.
4.
a. Terrorists
b. Criminals
c. Government agencies
d. Nation-states
e. Hackers
f. Disgruntled employees
g. Competitors
h. Anyone with access to a computing device (sadly)
The above are generic categories of types of attackers; these types of attackers are
usually refereed to the following:
a. Hacker/Cracker (criminal hacker)
b. script-kiddie
c. hactivists
d. etc...
A security practitioner must understand the enemy. Motivations and interests of the
people involved in breaking all those things you seek to protect.
a. Financial gain
b. Notoriety from attacking a well-known company or brand
c. Some throw their net wide and hurt companies both intended and unintended
Back in the old days
a. Basic intrusions
a. War dialing etc...
b. Viruses were fairly new but people sought notoriety as the Internet was in its
infancy stage
c. 1990s and early 2000s increase in number of viruses and malware; it was about
fame
Now it's more about actual theft of information and damage with financial
repercussions. Attackers may also be motivated by government or industrial espionage
2. Attack Methods
1. Most attackers try to keep in the shadows using a variety of techniques when
attempting to compromise a network
Table 1-4 Attack Methods
Action
Description
Reconnaissanc This is the discovery process used to find information about the network. It could
e
include scans of the network to find out which IP addresses respond, and further scans
to see which ports are open. This is usually the first step taken, to discover what is on
the network and to determine potential vulnerabilities.
Social
engineering
This is a tough one because it leverages our weakest (very likely) vulnerability in a
secure network: the user. If the attacker can get the user to reveal information, it is
much easier for the attacker than using some other method of reconnaissance. This
could be done through email or misdirection of web pages, which results in the user
clicking something that leads to the attacker gaining information. Social engineering
can also be done in person or over the phone.
Phishing presents a link that looks like a valid trusted resource to a user. When the user
clicks it, the user is prompted to disclose confidential information such as
usernames/passwords.
Pharming is used to direct a customer's URL from a valid resource to a malicious one
that could be made to appear as the valid site to the user. From there, an attempt is
made to extract confidential information from the user
Privilege
escalation
This is the process of taking some level of access (whether authorized or not) and
achieving an even greater level of access. An example is an attacker who gains user
mode access to a router and then uses a brute-force attack against the router,
determining what the enable secret is for privilege level 15 access
Back doors
When attackers gain access to a system, they usually want future access, as well, and
they want it to be easy. A backdoor application can be installed to either allow future
access or to collect information to use in further attacks.
Many back doors are installed by users clicking something without realizing the link
they click or the file they open is a threat. Back doors can also be implemented as a
result of a virus or a worm (often referred to as malware).
3. Attack Vectors
1. Attacks are launched both from the outside of a company and from within. It could be
a user who is just curious or perhaps the users computer has a backdoor on it. Your
security policy must not take anything for granted and protect the network from both
attack vectors.
2. A security policy that takes nothing for granted
a. 802.1x and Cisco ACS
b. Network Admission Control (NAC) or an Identity Service Engine (ISE)
c. Switch port security
4. Man-in-the-Middle Attacks
1. Main purpose is reconnaissance (eavesdropping). Sits in between two devices
communicating for reconnaissance or to manipulate the data. L2 or L3.
a. L2 ARP Poisoning: The attacker poisons the ARP table making the host think the
attacker is the default gateway, sending traffic to the attacker instead of the real
default gateway. In order to remain transparent, the attacker will forward the traffic
to the default gateway. Otherwise the host will think there is a network problem
and will not continue to send traffic.
a. Use DAI to mitigate
b. L2 STP Add a switch to the topology with a higher priority making it the root
switch seeing all traffic that must pass through the root switch.
a. Use root guard and other techniques to mitigate this
c. L2 CAM table - Another attack not discussed yet in the book is flooding the CAM
table with unique MAC addresses until the CAM memory runs out and all
subsequent traffic is broadcast so the attacker can use a packet analyzer to capture
all the traffic.
a. Use Port Security to mitigate this
d. L3 Rogue router installed and metrics offset to make the routing domain think
that the rogue router has the best routes or best paths to reach any particular
destination or prefix.
a. Mitigate this by using routing protocol authentication and also disabling
advertisements out interfaces that shouldn't have routing protocol neighbors
(passive-interface configuration).
e. Encryption and VPN Never use clear text management protocols; use SSH
and/or HTTPS, SNMPv3 etc... Also use VPN/Encrypted traffic for sensitive data.
Trust
exploitation
If the firewall has three interfaces, and the outside interface allows all traffic to the
demilitarized zone (DMZ), but not to the inside network, and the DMZ allows access
to the inside network from the DMZ, an attacker could leverage that by gaining access
to the DMZ and using that location to launch his attacks from there to the inside
network. Other trust models, if incorrectly configured, may allow unintentional access
to an attacker including active directory and NFS (network file system in UNIX).
Password
attacks
These could be brute force, where the attacker's system attempts thousands of possible
passwords looking for the right match. This is best protected against by specifying
limits on how many unsuccessful authentication attempts may occur within a specified
time frame. Password attacks can also be done through malware, man-in-the-middle
attacks using packet sniffers, or by using key loggers
Botnet
A botnet is a collection of infected computers that are ready to take instructions from
the attacker. For example, if the attacker has the malicious backdoor software installed
on 10,000 computers, from his central location he could instruct those computers to all
send TCP SYN requests or ICMP echo requests repeatedly to the same destination. To
add insult to injury, he could also spoof the source IP address of the request so that
reply traffic is sent to yet another victim. A covert channel is generally used by the
attacker to manage the individual devices that make up the botnet.
This rule states that minimal access is only provided to the required network
resources, and not any more than that. An example of this is an access list applied
to an interface for filtering that says deny all. Before this, specific entries could be
added allowing only the bare minimum of required protocols, and only then
between the correct source and destination addresses.
Defense in depth
This concept suggests that you have security implemented on nearly every point of
your network. An example is filtering at a perimeter router, filtering again at a
firewall, using IPSs to analyze traffic before it reaches your servers, and using
host-based security precautions at the servers as well. This is defense in depth.
Using authentication and authorization mechanisms could also be part of a
defense-in-depth approach.
The concept behind defense in depth is that if a single system fails, it does not
mean that security has completely been removed from the equation.
Separation of duties By placing specific individuals into specific roles, there can be checks and
balances in place regarding the implementation of the security policy. Rotating
individuals into different roles periodically will also assist in verifying that
vulnerabilities are being addressed, because a person who moves into a new role
will be required to review the policies in place.
Auditing
This refers to accounting and keeping records about what is occurring on the
network. Most of this can be automated through the features of authentication,
authorization and accounting (AAA) (covered later in this book). When events
happen on the network, the records of those events can be sent to an accounting
server. When the separation-of-duties approach is used, those who are making
changes on the network should not have direct access to modify or delete the
accounting records that are kept on the accounting server.
10. In relation to production networks, which of the following are viable options when
dealing with risk? (Choose all that apply.)
a. Ignore it
b. Transfer it
c. Mitigate it
d. Remove it
Page
Number
10
11
Text
Classifying countermeasures -
12
Text
Man-in-the-middle attacks -
15
16
18
An asset is an item that is to be protected and can include property, people, and
information/data that have value to the company. This includes intangible
items such as proprietary information or trade secrets and the reputation of the
company. The data could include company records, client information,
proprietary software, and so on
Vulnerability
Threat
This is what you are protecting against. A threat is anything that attempts to
gain unauthorized access to, compromise, destroy, or damage an asset. Threats
are often realized via an attack or exploit that takes advantage of an existing
vulnerability. Threats today come in many varieties and spread more rapidly
than ever before. Threats can also morph and be modified over time, and so
you must be ever diligent to keep up with them.
Risk
protections are in place (it is your goal to provide this protection), the potential
for the threat to be successful is reduced (thus reducing the overall risk).
Countermeasure
Covert channel
Trust exploitation
If the firewall has three interfaces, and the outside interface allows all traffic to
the demilitarized zone (DMZ), but not to the inside network, and the DMZ
allows access to the inside network from the DMZ, an attacker could leverage
that by gaining access to the DMZ and using that location to launch his attacks
from there to the inside network. Other trust models, if incorrectly configured,
may allow unintentional access to an attacker including active directory and
NFS (network file system in UNIX).
Password attacks
These could be brute force, where the attackers system attempts thousands of
possible passwords looking for the right match. This is best protected against
by specifying limits on how many unsuccessful authentication attempts may
occur within a specified time frame. Password attacks can also be done
through malware, man-in-the-middle attacks using packet sniffers, or by using
key loggers.
Botnet